3.3 Flashcards

Data types and classifications, states of data, protecting data

1
Q

8 data types

A

Regulated
Trade secret
Intellectual Property
Legal information
Financial information
Human-readable
Non-human readable
Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 data classifications

A

Sensitive
Confidential
Public/unclassified
Private/classified/restricted
Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A TYPE of data that is managed by a third-party (usually the govt)

Governed by laws and statutes

A

Regulated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A TYPE of data that is unique to an organization. The organization’s secret formulas.

A

Trade secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A TYPE of data that may be publicly visible, but is protected by copyright and trademark restrictions.

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A TYPE of data that includes court records and documents, judge and attorney information, PII and other sensitive details. Typically stored in many different systems, both private and public.

A

Legal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A TYPE of data that includes internal company financial details, customer financials, payment records, credit card data, bank records, etc.

A

Financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A TYPE of data that can be clearly understood by humans

A

Human-readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A TYPE of data that includes encoded data, barcodes, images–things that a human cannot easily understand.

A

Non-human readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A TYPE of data that includes CSV, XML, JSON. Some aspects can be understood by humans, but some cannot.

A

Hybrid of human-readable and non-human readable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data TYPES focus on

A

Content or use case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data CLASSIFICATIONS focus on

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that is the property of an organization. This data is unique to the organization and may include trade secrets.

A

Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data that includes data that can be used to identify a person. Name, DOB, mother’s maiden name, biometric information.

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data that includes an individual’s health information. Health status, healthcare records, payments for healthcare, etc.

A

PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PII stands for

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PHI stands for

A

Protected Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A CLASSIFICATION of data that is available to employees of an organization and has low security requirements.

Includes intellectual property, PII, PHI

A

Sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A CLASSIFICATION of data that can only be accessed by authorized personnel.

Includes trade secrets, financial information, business information.

A

Confidential

20
Q

A CLASSIFICATION of data that requires no restrictions on viewing.

A

Public / unclassified

21
Q

A CLASSIFICATION of data that has restricted viewing. May require an NDA to access.

A

Private / classified / restricted

22
Q

A CLASSIFICATION of data that should always be available. There should be processes and procedures maintaining uptime and availability to the data.

A

Critical

23
Q

Data on a storage device is described as

A

Data at rest

24
Q

How do you secure data at rest? (4)

A

Whole disk encryption
Database encryption
File- or folder-level encryption
Access control lists/permissions

25
Q

Data being transmitted over the network is described as

A

Data in transit

AKA data in motion

26
Q

How do you secure data in transit? (3)

A

Firewall
IPS
Transport encryption (TLS for web server, IPsec for ALL traffic)

27
Q

Data being actively processing in memory is described as

A

Data in use

28
Q

True/False

Data in use is almost always encrypted

A

False

It is almost always decrypted because you need to be able to see the data to perform operations on it

29
Q

The authority and right of a country or jurisdiction to govern and control the data generated within its borders. This means that the government has the power to regulate the collection, storage, processing, and distribution of data that originates within its territory.

This is important to consider when determining compliance with data regulations.

A

Data sovereignty

30
Q

A method of determining the location of a client when that client attempts to access a resource.

This can help prevent access from that resource to certain countries, or if the client is outside of a corporate office.

A

Geolocation

31
Q

Methods of determining geolocation (3)

A

GPS
802.11
Mobile providers

32
Q

3 methods of geographic restrictions

A

Network location
Geolocation
Geofencing

33
Q

A method of restricting data or giving different permissions depending on where a user is located (ex. Inside vs. outside an office building)

A

Geofencing

34
Q

Network location is found via…

A

IP subnet

35
Q

3 methods of geolocation

A

GPS - very accurate, good for mobile devices

802.11 wireless - wireless databases know all of the SSIDs of the mobile devices in the area, so they can record the location of those devices - less accurate, good for wireless devices

IP address - not very accurate, not good for mobile devices

36
Q

Difference between encryption and hashing

A

Encrypted data is able to be decrypted by design
Encryption is used to ensure confidentiality

Hashed data is impossible to recover in its original form
Hashing is used to ensure integrity, authentication, and nonrepudiation

37
Q

When using encryption, the encrypted data is drastically different from the original data. This difference is called ____

A

Confusion

38
Q

Difference between PGP and GPG

A

PGP is proprietary and provides customer support.

GPG is open-source and there is no dedicated customer support. However, there are a lot of tutorials and experienced users online who may help.

39
Q

Similarities of PGP and GPG

A

They are both encryption softwares designed to encrypt emails, verify email integrity, and verify the sender of the email.

40
Q

Are digital signatures created by hashing or encryption?

A

Both.

First, the original message is hashed.

That hash is then encrypted with the sender’s private key.

Both the original message and the encrypted hash is sent to the receiver.

The receiver decrypts the hash with the sender’s public key, and then the hash is compared with the original message.

41
Q

Difference between obfuscation and encryption

A

Encryption transforms the contents of a file to make it unreadable and unusable to anyone/anything unless they apply a special key.

Obfuscated code still works, but it is incredibly hard to read for humans, and it is difficult to understand the intended meaning of the contents of the file. Unlike encryption, it is not impossible to figure it out.

42
Q

A type of obfuscation that hides some of the original data. Often used to protect PII and other sensitive data.

This might just be a superficial measure; the original code may still be in the database, but part of it is hidden from view in the document that is presented.

May be done by these techniques:
Substituting
Shuffling
Encrypting
Masking out

A

Masking

43
Q

Difference between hashing/encryption and tokenization

A

The original data in hashing and encryption is mathematically related to the hashed/encrypted form

The original data in tokenization is NOT related to the token

44
Q

True/False

Tokenization is susceptible to replay attacks

A

False

Once a token is used, it can never be used again.

45
Q

A method of data security where you separate parts of the network depending on sensitivity.

A

Segmentation