Chapter 7 - Data Protection Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the importance of using appropriate cryptographic solutions?

A

Ensures confidentiality, integrity, and security of data

Cryptographic solutions protect sensitive information from unauthorized access and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the types of data classifications?

A
  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical

Each classification level determines the protection measures needed for the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who are the key data ownership roles?

A
  • Data Owners
  • Data Controllers
  • Data Processors
  • Data Custodians
  • Data Stewards

Each role has distinct responsibilities in managing and protecting data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the states of data?

A
  • Data at rest
  • Data in transit
  • Data in use

Different states require different protection methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data Loss Prevention (DLP)?

A

A strategy to prevent sensitive information from leaving an organization

DLP systems monitor data at rest, in use, or in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the protection methods for data at rest?

A
  • Full Disk Encryption (FDE)
  • Partition Encryption
  • File Encryption
  • Volume Encryption
  • Database Encryption
  • Record Encryption

These methods secure data stored on devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the transport encryption methods for data in transit?

A
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
  • VPN (Virtual Private Network)
  • IPSec (Internet Protocol Security)

These methods secure data moving across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does ‘Data Sovereignty’ refer to?

A

Digital information subject to laws of the country where it is located

This is especially relevant with global data storage in cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of data classification?

A

Helps allocate appropriate protection resources and prevents over-classification

Accurate classification is essential for effective data management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of sensitive data?

A
  • Personal Identification Information (PII)
  • Protected Health Information (PHI)
  • Trade Secrets
  • Intellectual Property (IP)
  • Financial Information

These types of data require stringent protection measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of a Data Owner?

A

A senior executive responsible for labeling information assets and ensuring protection

Data owners play a crucial role in data governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between human-readable and non-human-readable data?

A
  • Human-Readable: Understandable directly by humans
  • Non-Human-Readable: Requires machine or software to interpret

Understanding this distinction is important for data protection strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the security implications of proper hardware, software, and data asset management?

A

Ensures the confidentiality, integrity, and availability of information assets

Proper management minimizes vulnerabilities and enhances overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The process of identifying the individual responsible for maintaining the confidentiality, integrity, availability, and privacy of information assets is called _______.

A

Data Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Over-classifying data can lead to excessive costs.

17
Q

What are some methods to secure data?

A
  • Geographic Restrictions
  • Encryption
  • Hashing
  • Masking
  • Tokenization
  • Obfuscation
  • Segmentation
  • Permission Restriction

These methods help protect data from unauthorized access and breaches.

18
Q

What is the role of a Privacy Officer?

A

Oversees privacy-related data, ensuring compliance with legal and regulatory frameworks

Privacy officers are essential for protecting personally identifiable information (PII) and other sensitive data.

19
Q

What is the effect of data classification on organizational policies?

A

Organizational policies should clearly outline data classification, retention, and disposal requirements

Proper documentation is vital for compliance and effective data management.

20
Q

What type of data is controlled by laws and regulations?

A

Regulated Data

Examples include data governed by GDPR and HIPAA.

21
Q

What is the main goal of Data Loss Prevention (DLP) systems?

A

To detect and prevent data theft

DLP systems help organizations monitor sensitive data across various states.

22
Q

What is the definition of ‘masking’ in data protection?

A

Replace some or all data with placeholders

Masking is an irreversible de-identification method.