Data Classification Flashcards

1
Q

Who is the data owner ?

A

The data owner is the organisation that has collected or created the data. Normally assigned to an individual such as a department head. In the cloud the cloud customer is the data owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What duties does a data custodian perofrm ?

A

The data custodian is entrusted by the data owner to secure the data as well as daily administration and maintenance of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of the data processor ?

A

The data processor is anybody who manipulates, copies, prints or destroys the data on behalf of the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is ultimately responsible for data ?

A

Data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Does the data processor always have to have a direct link to the data owner ?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the stages of the data lifecycle ?

A

Create, Store, Use, Share, Archive, Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the ways data can be categorised?

A

Functional Unit
Business Unit

Project
Regulatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who classifies the data and when is it done ?

A

Data Owner in create phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data labelling ?

A

Labelling data from a security perspective makes sense by readily indicating the nature of certain information and how it should be handled and protected.

Common Labels are

Date of Creation
Date of scheduled destruction
Confidentiality
Handling directions
Dissemination
Source
Jurisdiction
Applicable Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data Discovery

A

Data Discovery relates to several techniques that an organisation utilizes to get a handle on its data architecture for either an investigation or creating an initial inventory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three main types of data discovery ?

A

Labels, Content and Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name four ways to categorise data ?

A

Regulatory, Business Function, Functional Unit, Project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name three ways to classify data ?

A

Sensitivity, Jurisdiction, Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give examples of some common data labels ?

A

Date of Creation
Date of Destruction
Confidentiality Level
Handling Directions
Disesemination
Access Limitation
Source
Jurisdiction
Applicable Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name five data discovery methods ?

A

Label, Metadata, Content, Structure, Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the jurisdictional requirements of Asia ?

A

Data privacy differs greatly between countries - Japan adheres to EU model as does Singapore China on the other had demands that all IT traffic and communications be accessible to the Chineses Government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the jurisdictional requirements of South and Central America ?

A

Most countries lack privacy protection frameworks except Argentina which has Personal Data Protection Act

18
Q

What are the jurisdictional requirements of Australia and New Zealand ?

A

Strong Privacy and Protection that maps to EU GDPR

19
Q

What are the jurisdictional requirements of Europe ?

A

Strong Personal Privacy info protection covered by GDPR

20
Q

What are the jurisdictional requirements of Usa ?

A

There is no singular, overarching federal privacy statute instead it tends to be industry led (HIPAA, GLBA) or contractual obligations such as PCI.

21
Q

What is copyright ?

A

The protection for the legal expression of ideas is copyright. It does not cover specific words, slogans, recipes or formulae.

The duration of copyright vary based on the terms under which they were created depending on if an individual created the work themselves or if the work was created under contract. Typically copyright lasts either for 70 years after the authors death or 120 after the first publication of work created under contract.

Copyright gives the creator

Perform the work publicly
Profit from the work
Make copies
Make derivative copies
Import or Expor
Broadcast
Sell or otherwise assign the rights.

Copyright infingement is usually dealt with as a civil case.

Normally it is the creator who owns the copyright but in some US states its the person who first registers it.

22
Q

What are trademarks ?

A

Applied to specific words and graphics - they are representation of organisation and its brand

US Patent and Trademark Office registers them (USPTO) - r or tm symbol

Infringement is actionable and lasts in perpetuity

23
Q

What are Patents

A

Protects invention, materials etc - Typically last for 20 years from the time of patent application

World Intellectual Property Office (WIPO) global

24
Q

What are trade secrets ?

A

food formulaes, commercial methods or aggregations of information. Trade Secrets must be kept secret to have protection lasts in perpetuity but if competitor discovers the secret they are not liable.

25
Q

What is a IRM rudimentary check ?

A

The content itself can automatically check for proper usage or ownership. For instance pausing in operation until some information that could only have been acquired with purchase of a licensed copy.

26
Q

What is a IRM local reference check ?

A

User installs a reference tool that checks the protected content against the users license.

27
Q

What is a IRM online reference check ?

A

The information is entered such as a key which is checked by the system online at a later date.

28
Q

What is a IRM prescence of licensed media chack ?

A

Some IRM systems require the presence of licensed media as content is being used.

29
Q

What is a IRM support based check ?

A

Some IRM solutions need proof of support for content

30
Q

What are the main features of IRM ?

A

Persistens Protection
Dynamic Policy Control
Automatic Expiration
Continuous Auditing
Replication Restrictions
Remote Rights Revocation

31
Q

What are data retention formats ?

A

The policy should contain a description of how the data is actually archived what type of media it is stored on and any handling specifications particular to that data - for example some data may need to be encrypted.

32
Q

What are archiving and retrieval procedures ?

A

Having data in storage can serve a business continuity and disaster recovery backups and can be determined for business intelligence purposes.

33
Q

What is a retention period ?

A

Length of time that the organisation should keep data - normally for long term storage which can be mandated or modified by contractual or regulatory agreements.

34
Q

What is legal hold ?

A

Legal Hold severely affects retention and destruction policies because it supersedes them - mandating the suspension of deletion activities until the reason for the legal hold is solved.

35
Q

What is the issue with log review analysis ?

A

Organisations lack resources for dedicated analyst
Log Review is mundan and repetitive
Log review requires both experienced and inexperienced operatives
Reviewer needs to understand operation to distinguish between authorised and non authorised activity

36
Q

What is De Gaussing ?

A

Use of magnets to erase data - does not work with solid state drives

37
Q

What is crypto shredding

A

Encrypting data with strong keys - then encrypt the keys with a second algorithm and then destroying keys of second round of encryption.

38
Q

What is overwriting

A

Multiple passes of random characters with a final pass of zeroes and ones - again not appropriate for solid state

39
Q

What does a traditional delete do ?

A

Hardware can never be sanitised by just deletion which dosent delete data but just removes logical pointers to that data.

40
Q
A