Data Protection Flashcards

1
Q

Data protection

A

Safeguarding information from corruption, compromise, or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Classification

A

Based on the value to organization and the sensitivity of the information, determined by the data owner

  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sensitive data

A

Information that, if accessed by unauthorized persons, can result in the loss of security or competitive advantage for a company

  • over classifying data leads to protecting data at a high level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Importance of data classification

A
  • Helps allocate appropriate protection resources
  • Prevents over-classification to avoid excessive costs
  • Requires proper policies to identify and classify data accurately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Commercial Business Classification Levels

A

Public - No impact if released; often publicly accessible data

Sensitive - Minimal impact if released (ex: financial data)

Private - Contains internal personnel or salary information

Confidential - Holds trade secrets, intellectual property, source code, etc

Critical - Extremely valuable and restricted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Government Classification Levels

A

Unclassified - Generally releasable to the public; can be released under the Freedom of Information Act

Sensitive, but unclassified - Includes medical records, personnel files, etc. ; no harm to national security

Confidential - Contains information that could affect the government (ex: trade secrets)

Secret - Holds data like military deployment plans, defensive postures

Top Secret - Highest level, highly sensitive national security information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Ownership

A

Process of identifying the individual responsible for maintaining the confidentiality, integrality, availability, and privacy of information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Owner

A

a senior executive responsible for labeling information and ensuring they are protected with appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Controller

A

Entity responsible for determining data storage, collection, and usage purposes and methods, as well as ensuring the legality of these processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data processor

A

a group or individual hired by the data controller to assist with tasks like data collection and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Steward

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and classified, often working under the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Custodian

A

Responsible for managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Officer

A

Oversees privacy-related data, such as PII, SPI, and PHI ensuring compliance with legal and regulatory frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Ownership Responsibility

A

The IT Department (CIO or IT personnel) should NOT be the data owner; data owners should be individuals from the business side who understand the data’s content and can make informed decisions about classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Selection of Data Owners

A

Should be designated within their respective departments based on their knowledge of the data and its significance within the organization

  • example: CFO controls financial data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data at Rest

A

Data stored in databases, file systems, or storage systems, not actively moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption Methods

A
  • Full Disk Encryption (FDE) = Encrypts the entire hard drive
  • ** Partition Encryption** = Encrypts specific partitions, leaving others unencrypted
  • Volume Encryption = Encrypts selected files or directories
  • Database Encryption = Encrypts data stored in a database at column, row, or table levels
  • Record Encryption = Encrypts specific fields within a database record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data in Transit

A

Data actively moving from one location to another, vulnerable to interception

Can be protected with transport encryption methods:
- SSL
- VPN
- IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Secure Sockets Layer (SSL)

A

Secure communication over networks, widely used in web browsing and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virtual Private Network (VPN)

A

Creates secure connections over less secure networks like the internet

21
Q

Internet Protocol Security (IPSec)

A

Secures IP communications by authenticating and encrypting IP packets

22
Q

Data in Use

A

Data actively being created, retrieved, updated, or deleted

Protection measures:
- Encryption at the application level = encrypts data during procession

  • Access controls = Restricts access to data during processing
  • Secure Enclaves = Isolated environments for processing sensitive data
  • Mechanisms like INTRL Software Guard; encrypts data in memory to prevent unauthorized access
23
Q

Regulated data

A

Controlled by laws, regulations, or industry standards

Compliance requirements:
- General Data Protection Regulation (GDPR)
- Health Insurance Portability and Accountability Act (HIPPA)

24
Q

Personal Identification Information (PII)

A

Information used to identify and individual
- names
- social security number
- addresses

25
Q

Protected Health Information (PHI)

A

Information about health status, healthcare provision, or payment linked to a specific individual

  • Protected under HIPAA
26
Q

Trade Secrets

A

Confidential business information giving a competitive edge

  • legally protected, unauthorized disclosure results in penalties

example:
- manufacturing processes
- marketing strategies
- Proprietary software

27
Q

Intellectual Property (IP)

A

Creations of the mind (inventions, literary works, designs)
- protected by patents , copyrights, trademarks to encourage innovation
- unauthorized use can lead to legal action

28
Q

Legal Information

A

Data related to legal proceedings, contracts, regulatory compliance

  • requires high-level protection for client confidentiality and legal privilege
29
Q

Financial Information

A

Data related to financial transactions like sales records, tax documents, bank statements

  • Targeted by cyber criminals for fraud and identity theft
  • subject to PCI DSS (Payment Card Industry Data Security Standard)
30
Q

Human-Readable Data

A

Understandable directly by humans (text documents, spreadsheets)

31
Q

Non-Human-Readable Data

A

Requires machine or software to interpret
- Binary code
- machine language

Contains sensitive information and requires protection

32
Q

Data Sovereignty

A

Digital information subject to laws of the country where its located

  • Gained importance with cloud computing’s global data storage
33
Q

General Data Protection Regulation (GDPR)

A

Protects EU citizens’ data within EU and EEA borders
- compliance required regardless of data location
- non-compliance leads to significant fines

34
Q

Data Sovereignty Laws (ex: Chine/Russia)

A

Require data storage and processing within national borders
- challenge for multinational companies and cloud services
- pose complex challenges

35
Q

Access Restrictions

A

Cloud services may restrict access from multiple geographic locations

36
Q

Geographic Restrictions (Geofencing)

A

Virtual boundaries to restrict data access based on location
- compliance with data sovereignty laws
- prevent unauthorized access from high risk locations

37
Q

Encryption

A

Transform plaintext into cipher text using algorithms and keys

  • protects data at rest and in transit
  • requires decryption key for data recovery
38
Q

Hashing

A

Converts data into fixed-size hash values
- Irreversible one-way function
- commonly used for password storage

39
Q

Masking

A

Replace some or all data with placeholders (ex: “x”)
- partially retains metadata for analysis
- irreversible de-identification method

40
Q

Tokenization

A

Replacing sensitive data with non-sensitive tokens
- original data stored securely in a separate database
- often used in patient processing for credit card protection

41
Q

Obfuscation

A

Make data unclear or unintelligible
- Various techniques, including encryption, masking, and pseudonyms
- hinder unauthorized understanding

42
Q

Segmentation

A

Divide network into separate segments with unique security controls
- prevent lateral movement in case of a breach
- limits potential damage

43
Q

Permission Restrictions

A

Define data access and actions through ACLs (Access Control Lists) and RBACs (Role-Based Access Controls)

44
Q

Data Loss Prevention (DLP)

A

Aims to monitor data in use, in transit, or at rest to detect and prevent data theft

  • DLP systems are available as software or hardware solutions
45
Q

Endpoint DLP System

A

Installed as software on workstations or laptops
- Monitors data in use on individual computers
- Can prevent or alert on file transfers based on predefined rules

46
Q

Network DLP System

A

Software or hardware placed at the network perimeter
- Focuses on monitoring data entering and leaving the network
- Detects unauthorized data leaving the network

47
Q

Storage DLP System

A

Installed on a server in the data center

  • inspects data at rest, especially encrypted or watermarked data
  • monitors data access patterns and flags policy violations
48
Q

Cloud-Based DLP System

A

Offered as a software-as-a-service solution
- protects data stored in cloud services