Chapter 5 Flashcards
What can bd used to protect data in thr cloud and provide DLP features
Cloud access security broker (CASB)
What’s the difference between pseudonormalisation and tokenisation
Pseudonormalisation substitutes data with other data to make itess confidential such as removing PII
Tokenisation is typically used for credit card transactions the organisations and hold the actual credit card details
What’s the difference between scoping and Tayloring 
Tailoring is modifying a list of security controls to ensure they line with the mission of the organisation
Tailoring include scoping scoping refers to reviewing a list of baseline security controls and selecting only those that apply to the IT system
What are the different types of data roles
Data owners are responsible for classifying labelling and protecting data
A data controller decide what data to process and directs the data processor to process the data
Administrators grant access to data based on the guidelines provided by the data owner
A custodian is responsible for the task of implementing the protections defined by the security policy and senior management
A business owner is a senior manager who owns the process to ensure the system provides value to the organisation
What system can be used to idenify data based on pattens amd classified data from leaving an organisation
data loss prevention (DLP)