3.3 Compare and contrast concepts and strategies to protect data. Flashcards

1
Q
  • Data types
A
  • Regulated
  • Trade secret
  • Intellectual property
  • Legal information
  • Financial information
  • Human- and non-human - readable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulated Data

A

■ Controlled by laws, regulations, or industry standards
■ Compliance requirements
● General Data Protection Regulation (GDPR)
● Health Insurance Portability and Accountability Act (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII (Personal Identification Information)

A

■ Information used to identify an individual (e.g., names, social security numbers,
addresses)
■ Targeted by cybercriminals and protected by privacy laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

○ PHI (Protected Health Information)

A

■ Information about health status, healthcare provision, or payment linked to a
specific individual
■ Protected under HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trade Secrets

A

■ Confidential business information giving a competitive edge (e.g., manufacturing
processes, marketing strategies, proprietary software)
■ Legally protected; unauthorized disclosure results in penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intellectual Property (IP)

A

■ Creations of the mind (e.g., inventions, literary works, designs)
■ Protected by patents, copyrights, trademarks to encourage innovation
■ Unauthorized use can lead to legal action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Legal Information

A

■ Data related to legal proceedings, contracts, regulatory compliance

Requires high-level protection for client confidentiality and legal privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

○ Financial Information

A

■ Data related to financial transactions (e.g., sales records, tax documents, bank
statements)
■ Targeted by cybercriminals for fraud and identity theft
■ Subject to PCI DSS (Payment Card Industry Data Security Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Human-Readable Data

A

■ Understandable directly by humans (e.g., text documents, spreadsheets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-Human-Readable Data

A

■ Requires machine or software to interpret (e.g., binary code, machine language)
■ Contains sensitive information and requires protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data classifications

A
  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Restricted data

A

is highly confidential business or personal information. There are often general statutory, regulatory or contractual requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sensitive Data

A

Information that, if accessed by unauthorized persons, can result in the loss of
security or competitive advantage for a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

○ Importance of Data Classification

A

■ Helps allocate appropriate protection resources
■ Prevents over-classification to avoid excessive costs
■ Requires proper policies to identify and classify data accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public

A

● No impact if released; often publicly accessible data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private

A

● Contains internal personnel or salary information

17
Q

Confidential

A

● Holds trade secrets, intellectual property, source code, etc.

18
Q

■ Critical

A

● Extremely valuable and restricted information

19
Q

Commercial Business Data Classification Levels

A

Public: often publicly accessible data
Sensitive: Minimal impact if released, e.g., financial data

Private : Contains internal personnel or salary information

Confidential : Holds trade secrets, intellectual property, source code, etc.

Critical : Extremely valuable and restricted information

20
Q

Government Classification Levels

A

■ Unclassified
● Generally releasable to the public

■ Sensitive but Unclassified
● Includes medical records, personnel files, etc.

■ Confidential
● Contains information that could affect the government

■ Secret
● Holds data like military deployment plans, defensive postures

■ Top Secret
● Highest level, includes highly sensitive national security information

21
Q

General data considerations

A
  • Data states
    o Data at rest
    o Data in transit
    o Data in use
  • Data sovereignty
  • Geolocation
22
Q

Data Sovereignty

A

■ Information subject to laws and governance structures within the nation it is
collected

23
Q

Data at Rest

A

■ Data stored in databases, file systems, or storage systems, not actively moving

24
Q

Data in Transit (Data in Motion)

A

Data actively moving from one location to another, vulnerable to interception

25
Q

Transport Encryption Methods

A
  • SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
  • VPN (Virtual Private Network)
  • IPSec (Internet Protocol Security)
26
Q

SSL (Secure Sockets Layer) and TLS (Transport Layer Security)

A

○ Secure communication over networks, widely used in web
browsing and email

27
Q

VPN (Virtual Private Network)

A

○ Creates secure connections over less secure networks like the
internet

28
Q

IPSec (Internet Protocol Security)

A

○ Secures IP communications by authenticating and encrypting IP
packets

29
Q

Data in Use

A

■ Data actively being created, retrieved, updated, or deleted

30
Q

Data in Use Protection Measures

A

● Encryption at the Application Level
○ Encrypts data during processing

● Access Controls
○ Restricts access to data during processing

● Secure Enclaves
○ Isolated environments for processing sensitive data

● Mechanisms like INTEL Software Guard
○ Encrypts data in memory to prevent unauthorized access

31
Q
  • Methods to secure data
A
  • Geographic restrictions
  • Encryption
  • Hashing
  • Masking
  • Tokenization
  • Obfuscation
  • Segmentation
  • Permission restrictions
32
Q

Geographic Restrictions (Geofencing)

A

■ Virtual boundaries to restrict data access based on location
■ Compliance with data sovereignty laws
■ Prevent unauthorized access from high-risk locations

33
Q

Encryption

A

■ Transform plaintext into ciphertext using algorithms and keys
■ Protects data at rest and in transit
■ Requires decryption key for data recovery

34
Q

Hashing

A

■ Converts data into fixed-size hash values
■ Irreversible one-way function
■ Commonly used for password storage

35
Q

Masking

A

■ Replace some or all data with placeholders (e.g., “x”)
■ Partially retains metadata for analysis
■ Irreversible de-identification method

36
Q

Tokenization

A

■ Replace sensitive data with non-sensitive tokens
■ Original data stored securely in a separate database
■ Often used in payment processing for credit card protection

37
Q

Obfuscation

A

■ Make data unclear or unintelligible
■ Various techniques, including encryption, masking, and pseudonyms
■ Hinder unauthorized understanding

38
Q

Segmentation

A

■ Divide network into separate segments with unique security controls
■ Prevent lateral movement in case of a breach
■ Limits potential damage

39
Q

○ Permission Restrictions

A

■ Define data access and actions through ACLs or RBAC
■ Restrict access to authorized users
■ Reduce risk of internal data breaches