Data Protection Flashcards

1
Q

Data classification

A

Based on the value to the organization and the sensitivity of the information,
determined by the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Commercial Business Classification Levels

A
  1. Public
  2. Sensitive
  3. Private
  4. Confidential
  5. Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Government Classification Levels

A
  1. Unclassified
  2. Sensitive but Unclassified
  3. Confidential
  4. Secret
  5. Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Owner

A

A senior executive responsible for labeling information assets and ensuring they
are protected with appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Processor

A

A group or individual hired by the data controller to assist with tasks like data
collection and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Controller

A

Entity responsible for determining data storage, collection, and usage purposes
and methods, as well as ensuring the legality of these processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Steward

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and
classified, often working under the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Custodian

A

Responsible for managing the systems on which data assets are stored, including
enforcing access controls, encryption, and backup measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy Officer

A

Oversees privacy-related data, such as personally identifiable information (PII),
sensitive personal information (SPI), or protected health information (PHI),
ensuring compliance with legal and regulatory frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SPI

A

Sensitive Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHI

A

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Ownership Responsibility

A

The IT department (CIO or IT personnel) should not be the data owner; data
owners should be individuals from the business side who understand the data’s
content and can make informed decisions about classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data at Rest

A

Data stored in databases, file systems, or storage systems, not actively moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption Methods for data at rest

A
  1. Full Disk Encryption (FDE)
  2. Partition Encryption
  3. File Encryption
  4. Volume Encryption
  5. Database Encryption
  6. Record Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data in Transit

A

Data actively moving from one location to another, vulnerable to interception

17
Q

Transport Encryption Methods

A
  1. SSL and TLS
  2. VPN
  3. IPSec
18
Q

SSL

A

Secure Sockets Layer

Secure communication over network, widely used in web browsing and email

19
Q

TLS

A

Transport Layer Security

Supersedes SSL

20
Q

VPN

A

Virtual Private Network

Creates secure connections (tunnels) over less secure networks like the internet

21
Q

IPSec

A

Internet Protocol Security

Secures IP communications by authenticating and encrypting IP packets

22
Q

Data in Use

A

Data actively being created, retrieved, updated, or deleted

23
Q

Data in Use protection methods

A
  1. Encryption at application level
  2. Access Controls
  3. Secure Enclaves
  4. Memory Encryption
24
Q

Secure Enclave

A

Isolated environment for processing sensitive data

25
Q

Regulated data

A

Data that is controlled by laws, regulations, or industry standards. Subject to compliance requirements (GDPR, HIPAA etc.)

26
Q

GDPR

A

General Data Protection Regulation

  • Protects EU citizens’ data within EU and EEA borders
  • Compliance required regardless of data location
  • Non-compliance leads to significant fines
27
Q

HIPAA

A

Health Insurance Portability and Accountability Act

28
Q

PCI DSS

A

Payment Card Industry Data Security Standard

29
Q

Data Sovereignty

A

Digital information subject to laws of the country where it’s located

Gained importance with cloud computing’s global data storage

30
Q

Geographic Restrictions

A

aka Geofencing

  • Virtual boundaries to restrict data access based on location
  • Compliance with data sovereignty laws
  • Prevent unauthorized access from high-risk locations
31
Q

Encryption

A
  • Transform plaintext into ciphertext using algorithms and keys
  • Protects data at rest and in transit
  • Requires decryption key for data recovery
32
Q

Hashing

A
  • Converts data into fixed-size hash values
  • Irreversible one-way function
  • Commonly used for password storage
33
Q

Masking

A
  • Replace some or all data with placeholders (e.g., “x”)
  • Partially retains metadata for analysis
  • Irreversible de-identification method
34
Q

Tokenization

A
  • Replace sensitive data with non-sensitive tokens
  • Original data stored securely in a separate database
  • Often used in payment processing for credit card protection
35
Q

Obfuscation

A
  • Make data unclear or unintelligible
  • Various techniques, including encryption, masking, and pseudonyms
  • Hinder unauthorized understanding
36
Q

Segmentation

A
  • Divide network into separate segments with unique security controls
  • Prevent lateral movement in case of a breach
  • Limits potential damage
37
Q

Permission Restrictions

A
  • Define data access and actions through ACLs or RBAC
  • Restrict access to authorized users
  • Reduce risk of internal data breaches
38
Q

DLP

A

Data Loss Prevention