D Flashcards
DAD Triad
The 3 key treats to cybersecurity efforts: disclosure, alteration, and denial.
Dark Web
An anonymous network created through encryption technology and often used for illicit activity. 14
Dashboard Reporting
Utilizes visual aids like graphs and charts to summarize risk data, usually in real time.
Data At Rest
Stored data that resides on hard drives, on tapes, in the cloud, or on other storage media.
Data Breach Notification Law
Laws requiring the notification of data subjects after a known or suspected breach.
Data Classification Policy
A document that describes the classification structure used by the organization and the process used to properly assign classification to data.
Data Controller
In the context of a data processor, as defined by the European Union data protection laws, the person or entity that controls processing of the data.
Data custodian
The user who is assigned the task of implementing the prescribed protection defined by the security policy and upper management. The data custodian preforms any and all activities necessary to provide adequate protection for data and to fulfill the requirements and responsibilities delegated to them from upper management.
Data Exfiltration Attack
An attack in which access to sensitive information is gained and then removed from an organization. 15
Data Exposure
The concept that sensitive personal information in databases exposes and organization to risk in the event that information is stolen by an attacker. 15
Data Governance Policy
A document that clearly states the owner of information created or used by the organization
Data In Transit
Data that is in transit over a network
Data In Use
Data that is actively in use by a computer system 15
Data Inventory
The first step in managing sensitive data is developing a data inventory of the types of information maintained by the organization and the places where that data is stored, processed, and transmitted. 15
Data Loss
The exposure of sensitive information to unauthorized individuals. 15
Data Loss Prevention (DLP)
Any systems that identify, monitor, and protect data to prevent it from unauthorized use, modification, destruction, egress, or exfiltration from a location.
Data Masking
A tool that redacts sensitive information by replacing some of or all sensitive fields with blank characters. 15
Data Minimization
The techniques seeking to reduce risk by reducing the amount of sensitive information maintained on a regular basis. 15
Data Obfuscation
The process that transforms data into a format where the original information can not be retrieved. 15
Data Owner
The person responsible for classifying information for placement and protection with the security solution. 15
Data Ownership
The organization designates specific senior executives as the data owners fo different data types. 16
Data Processor
An individual or entity who processes personal data solely on behalf of the data controller. 16
Data Protection Office (DPO)
Data Protection Officer - A specific individual who bears overall responsibility for carrying out the organization’s data privacy efforts.16
Data Retention Policy
A document that outlines what information the organization will maintain, and the length of time different categories of work product will be retained before destruction. 16
Data Sovereignty
A principle that states that data is subject to the legal restrictions of any jurisdiction where it is collected, stored or processed. 16
Data Steward
An individual who is responsible for carrying out an organizations data security policies and overseeing data usage based on those policies.
Data subject
Individual whose personal data is being processed.
Database Encryption
Targets data at the database level. It is a method used to protect sensitive policies and overseeing data usage based on those policies. 16
Database Normalization
The process of removing duplication in a relational database. 16
Dead Code
Code that is in use in an organization, but nobody is responsible for the maintenance of that code, and in fact, nobody even know where the original source file reside. 16
Debug Modes
The feature that gives developers crucial error information needed to troubleshoot applications in the development process. 16
Decentralized
An approach that reduces single points of failure by spreading technology components across multiple providers.