Chapter 7 - Data Protection Flashcards
What is the importance of using appropriate cryptographic solutions?
Ensures confidentiality, integrity, and security of data
Cryptographic solutions protect sensitive information from unauthorized access and data breaches.
What are the types of data classifications?
- Sensitive
- Confidential
- Public
- Restricted
- Private
- Critical
Each classification level determines the protection measures needed for the data.
Who are the key data ownership roles?
- Data Owners
- Data Controllers
- Data Processors
- Data Custodians
- Data Stewards
Each role has distinct responsibilities in managing and protecting data.
What are the states of data?
- Data at rest
- Data in transit
- Data in use
Different states require different protection methods.
What is Data Loss Prevention (DLP)?
A strategy to prevent sensitive information from leaving an organization
DLP systems monitor data at rest, in use, or in transit.
What are the protection methods for data at rest?
- Full Disk Encryption (FDE)
- Partition Encryption
- File Encryption
- Volume Encryption
- Database Encryption
- Record Encryption
These methods secure data stored on devices.
What are the transport encryption methods for data in transit?
- SSL (Secure Sockets Layer)
- TLS (Transport Layer Security)
- VPN (Virtual Private Network)
- IPSec (Internet Protocol Security)
These methods secure data moving across networks.
What does ‘Data Sovereignty’ refer to?
Digital information subject to laws of the country where it is located
This is especially relevant with global data storage in cloud computing.
What is the purpose of data classification?
Helps allocate appropriate protection resources and prevents over-classification
Accurate classification is essential for effective data management.
What are examples of sensitive data?
- Personal Identification Information (PII)
- Protected Health Information (PHI)
- Trade Secrets
- Intellectual Property (IP)
- Financial Information
These types of data require stringent protection measures.
What is the role of a Data Owner?
A senior executive responsible for labeling information assets and ensuring protection
Data owners play a crucial role in data governance.
What is the difference between human-readable and non-human-readable data?
- Human-Readable: Understandable directly by humans
- Non-Human-Readable: Requires machine or software to interpret
Understanding this distinction is important for data protection strategies.
What are the security implications of proper hardware, software, and data asset management?
Ensures the confidentiality, integrity, and availability of information assets
Proper management minimizes vulnerabilities and enhances overall security.
Fill in the blank: The process of identifying the individual responsible for maintaining the confidentiality, integrity, availability, and privacy of information assets is called _______.
Data Ownership
True or False: Over-classifying data can lead to excessive costs.
True
What are some methods to secure data?
- Geographic Restrictions
- Encryption
- Hashing
- Masking
- Tokenization
- Obfuscation
- Segmentation
- Permission Restriction
These methods help protect data from unauthorized access and breaches.
What is the role of a Privacy Officer?
Oversees privacy-related data, ensuring compliance with legal and regulatory frameworks
Privacy officers are essential for protecting personally identifiable information (PII) and other sensitive data.
What is the effect of data classification on organizational policies?
Organizational policies should clearly outline data classification, retention, and disposal requirements
Proper documentation is vital for compliance and effective data management.
What type of data is controlled by laws and regulations?
Regulated Data
Examples include data governed by GDPR and HIPAA.
What is the main goal of Data Loss Prevention (DLP) systems?
To detect and prevent data theft
DLP systems help organizations monitor sensitive data across various states.
What is the definition of ‘masking’ in data protection?
Replace some or all data with placeholders
Masking is an irreversible de-identification method.