4. Information Management Flashcards
What is Data Governance?
Programs that identify, track, and manage sensitive information for an organization, ensuring that data handling practices are consistent with the organization’s policies and procedures
What is included in Data Governance?
- Building a data inventory
- Data classification
- Data flow mapping
- Data lifecycle management
What are some data inventory types?
- Personally identifiable information (PII)
- Protected health information (PHI)
- Financial information
- Government information
What is data classification?
Data categories based on the sensitivity of the information and the impact on the organization should the information be inadvertently disclosed
List the business data classification typically used
- Highly sensitive
- Sensitive
- Internal
- Public
What is data flow mapping?
Tracking the ways the organization receives, handles, shares, and disposes of sensitive information
Why are data flow diagrams helpful?
Helps the privacy professional understand the movement of information through their organizations and also contribute to their ability to manage the full data lifecycle
What is data minimization
Collecting the smallest possible amount of information to meet the business requirement
What is purpose limitation
Data should only be used for the purpose that it was originally collected and that was consented to by the data subjects
Explain data retention
Guides end of the data lifecycle
What are the stages of the data lifecycle?
- Data creation
- Data storage
- Data sharing and usage
- Data archival
- Data deletion
List some cybersecurity threat actors
- Script Kiddies
- Hacktivist
- Criminal syndicates
- Advanced Persistent Threats (APT)
- Insiders
What is ransomware?
Ransomware combines traditional malware techniques with the weaponization of encryption technology.
What is an incident event?
Any observable occurrence in a system or network
What is an incident adverse event?
Any event that has negative consequences