3.3 Data Protection Concepts & Strategies Flashcards
Data States
Data at Rest: Data stored on a storage medium.
Data in Transit: Data moving across a network.
Data in Use: Data being processed by a system.
Data Classification
Public Data: Accessible to everyone.
Private Data: Accessible to a limited group.
Confidential Data: Sensitive data requiring strict access controls.
Restricted Data: Highly sensitive data requiring stringent security measures.
Data Types
Regulated Data: Subject to specific regulations and compliance standards.
Trade Secrets: Confidential business information.
Intellectual Property: Creations of the mind protected by law.
Personal Health Information (PHI): Health-related information about individuals.
Personally Identifiable Information (PII): Information that can identify an individual.
Financial Information: Data related to financial transactions.
Data Life Cycle
Create: Data generation, acquisition, or modification.
Store: Data storage on physical or digital media.
Use: Data processing, analysis, or modification.
Share: Data distribution to authorized users.
Archive: Long-term storage of inactive data.
Destroy: Securely erasing or destroying data.
Securing Data
Geographic and Cultural Restrictions: Considering legal and cultural factors when storing and processing data.
Encryption: Protecting data by transforming it into unreadable ciphertext.
Hashing: Creating a unique digital fingerprint of data.
Masking: Hiding sensitive information by replacing it with characters.
Obfuscation: Making data difficult to understand.
Tokenization: Replacing sensitive data with non-sensitive tokens.
Segmentation and Compartmentalization: Dividing data into smaller, isolated segments.
Load Balancing and Clustering
Load Balancing: Distributing network traffic across multiple servers to improve performance and reliability.
Clustering: Grouping multiple servers to work together as a single system.
Backup Strategies
Full Backup: Complete copy of all data.
Incremental Backup: Backup of only data that has changed since the last backup.
Differential Backup: Backup of all data that has changed since the last full backup.
Snapshot: Point-in-time copy of data.
Journaling: Recording changes to data for recovery purposes.
Continuity of Operations and Multicloud
Business Impact Analysis (BIA): Identifying critical business functions and their recovery time objectives (RTOs) and recovery point objectives (RPOs).
Disaster Recovery Planning (DRP): Developing a plan to restore IT systems and operations after a disaster.
Multicloud: Utilizing multiple cloud providers to improve reliability, performance, and security.
Disaster Recovery Sites
Hot Site: Fully operational site with all necessary hardware, software, and data.
Warm Site: Site with essential hardware and software, but requires some setup time.
Cold Site: Site with minimal infrastructure, requiring significant setup time.
Cloud-Based Recovery: Leveraging cloud services for disaster recovery.
Capacity Planning
People: Ensuring adequate staffing levels and skills.
Technology: Identifying and procuring necessary hardware and software.
Infrastructure: Planning for sufficient infrastructure capacity.
Testing Techniques
Read-Through: Reviewing the disaster recovery plan.
Tabletop Exercise: Simulating a disaster scenario without actual systems.
Walkthrough Test: Practicing specific recovery procedures.
Simulation Test: Testing the actual recovery process with simulated data.Parallel Testing: Testing the recovery process in parallel with live operations.
Failover Testing: Switching to a backup system to test its functionality.