What is Data State?
different states or phases that data can exist in throughout its lifecycle
What are the different data states?
Describe Data at Rest.
What are the security considerations?
Describe Data in Transit.
What are the security considerations?
Describe Data in Use.
What are the security considerations?
What is Scoping?
What are the scoping considerations?
What is Tailoring?
What are the Tailoring considerations?
What is a data protection method?
techniques and technologies employed to safeguard data and prevent unauthorized access, loss, or misuse
What’s Digital Rights Management (DRM)?
managing and enforcing access controls and usage rights for digital content
What are Digital Rights Management (DRM) technologies used for?
protect copyrighted materials, such as music, movies, e-books, and software
What’s DLP?
What are the functions of DLP?
What does CASB stand for?
Cloud Access Security Broker
What is CASB?
What are the security benefits that CASB provide?
What’s pseudoanonymization?
What type of encryption may allow to work on encrypted data?
homomorphic encryption
What organization tracks data breaches?
Identity Theft Resource Center (ITRC)
What are the 2 types of DLP protection?
What’s the reason personnel should never work on classified data on unclassified system?
some OSes fill slack space with data from memory, if a user worked on a top secret file moment ago and then creates a small unclassified file, the small file might contain top secret data pulled from memory
What tools can be used to hide data within slack space?
bmap on Linux and Slacker on Windows
When is pseudoanonymization most useful?
when releasing data set to a third party without releasing any privacy data to the third party