Chapter 5 Flashcards

1
Q

What can bd used to protect data in thr cloud and provide DLP features

A

Cloud access security broker (CASB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the difference between pseudonormalisation and tokenisation

A

Pseudonormalisation substitutes data with other data to make itess confidential such as removing PII

Tokenisation is typically used for credit card transactions the organisations and hold the actual credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the difference between scoping and Tayloring 

A

Tailoring is modifying a list of security controls to ensure they line with the mission of the organisation
Tailoring include scoping scoping refers to reviewing a list of baseline security controls and selecting only those that apply to the IT system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the different types of data roles

A

Data owners are responsible for classifying labelling and protecting data
A data controller decide what data to process and directs the data processor to process the data
Administrators grant access to data based on the guidelines provided by the data owner
A custodian is responsible for the task of implementing the protections defined by the security policy and senior management
A business owner is a senior manager who owns the process to ensure the system provides value to the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What system can be used to idenify data based on pattens amd classified data from leaving an organisation

A

data loss prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly