Data Protection Flashcards

1
Q

Based on the value to the organization and the sensitivity of the information, determined by the data owner

A

Data Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information that, if accessed by unauthorized persons, can result in the loss of security or competitive advantage for a company

Over classifying data leads to protecting all data at a high level

A

Sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is Data Classification Important?

A

■ Helps allocate appropriate protection resources
■ Prevents over-classification to avoid excessive costs
■ Requires proper policies to identify and classify data accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Commercial Business Classification Levels?

A

Public Data (No impact if released)
Sensitive (Minimal Impact if released ex. financial data)
Private (Contains internal personnel or salary info)
Confidential (Holds trades secrets, intellectual property, code, etc)
Critical (Extremely valuable and restricted info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Govermnet Classification Levels?

A

Unclassified (Generally releasable to public)
Sensitive but Unclassified (includes medical records, personnel files)
Confidential (Contains info that could affect the goverment)
Secret (Holds data like military deployment plans, defensive postures)
Top Secret (Highest level, includes highly sensitiv national security info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Process of identifying the individual responsible for maintaining the
confidentiality, integrity, availability, and privacy of information assets

A

Data Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A senior executive responsible for labeling information assets and ensuring they are protected with appropriate controls

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Entity responsible for determining data storage, collection, and usage purposes and methods, as well as ensuring the legality of these processes

A

Data Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group or individual hired by the data controller to assist with tasks like data collection and processing

A

Data Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Focuses on data quality and metadata, ensuring data is appropriately labeled and classified, often working under the data owner

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Responsible for managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

A

Data Custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Oversees privacy-related data, such as personally identifiable information (PII), sensitive personal information (SPI), or protected health information (PHI), ensuring compliance with legal and regulatory frameworks

A

Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Owner Responsibility

A

The IT department (CIO or IT personnel) should not be the data owner; data owners should be individuals from the business side who understand the data’s content and can make informed decisions about classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Selection of Data Owners

A

Data owners should be designated within their respective departments based on their knowledge of the data and its significance within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data stored in databases, file systems, or storage systems, not actively moving

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data at Rest - Encryption Methods

A

Full Disk Encryption (FDE) - entire hard drive
Partition Encryption - Specific Partitions
File Encryption - individual files
Volume Encryption - selected files/directories
Database Encryption - database column,row, or table
Record Encryption - speicific fields within a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data actively moving from one location to another, vulnerable to interception

A

Data in Transit (Data in Motion)

18
Q

Data in Transit - Transport Encryption Methods

A

SSL (Secure Sockets Layer)
TLS (Transport Layer Security)
VPN (VIrtual Private Network)
IPSec (Internet Protocol Security)

19
Q

Data actively being created, retrieved, updated, or deleted

A

Data in Use

20
Q

Data in Use - Protection Measures

A

Encryption at Application Level
Access Controls
Secure Enclaves
Machanisms like INTEL Software Guard

21
Q

Information controlled by laws, regulations, or industry standards

Compliance requirements
● General Data Protection Regulation (GDPR)
● Health Insurance Portability and Accountability Act (HIPAA)

A

Regulated Data

22
Q

Information used to identify an individual (e.g., names, social security numbers, addresses)

Targeted by cybercriminals and protected by privacy laws

A

PII (Personal Identification Information)

23
Q

Information about health status, healthcare provision, or payment linked to a specific individual

Protected under HIPAA

A

PHI (Protected Health Information)

24
Q

Confidential business information giving a competitive edge (e.g., manufacturing processes, marketing strategies, proprietary software)

Legally protected; unauthorized disclosure results in penalties

A

Trade Secrets

25
Creations of the mind (e.g., inventions, literary works, designs) Protected by patents, copyrights, trademarks to encourage innovation Unauthorized use can lead to legal action
Intellectual Property (IP)
26
Data related to legal proceedings, contracts, regulatory compliance Requires high-level protection for client confidentiality and legal privilege
Legal Information
27
Data related to financial transactions (e.g., sales records, tax documents, bank statements) Targeted by cybercriminals for fraud and identity theft Subject to PCI DSS (Payment Card Industry Data Security Standard)
Financial Information
28
Understandable directly by humans (e.g., text documents, spreadsheets)
Human-Readable Data
29
Requires machine or software to interpret (e.g., binary code, machine language) Contains sensitive information and requires protection
Non-Human-Readable Data
30
Digital information subject to laws of the country where it's located Gained importance with cloud computing's global data storage
Data Sovereignty
31
Protects EU citizens' data within EU and EEA borders Compliance required regardless of data location Non-compliance leads to significant fines
GDPR (General Data Protection Regulation)
32
Require data storage and processing within national borders Challenge for multinational companies and cloud services
Data Sovereignty Laws (e.g., China, Russia)
33
Virtual boundaries to restrict data access based on location Compliance with data sovereignty laws Prevent unauthorized access from high-risk locations
Geographic Restrictions (Geofencing)
34
Transform plaintext into ciphertext using algorithms and keys Protects data at rest and in transit Requires decryption key for data recovery
Encryption
35
Converts data into fixed-size hash values Irreversible one-way function Commonly used for password storage
Hashing
36
Replace some or all data with placeholders (e.g., "x") Partially retains metadata for analysis Irreversible de-identification method
Masking
37
Replace some or all data with placeholders (e.g., "x") Partially retains metadata for analysis Irreversible de-identification method
Tokenization
38
Make data unclear or unintelligible Various techniques, including encryption, masking, and pseudonyms Hinder unauthorized understanding
Obfuscation
39
Divide network into separate segments with unique security controls Prevent lateral movement in case of a breach Limits potential damage
Segmentation
40
Define data access and actions through ACLs or RBAC Restrict access to authorized users Reduce risk of internal data breaches
Permission Restrictions
41
Aims to monitor data in use, in transit, or at rest to detect and prevent data theft are available as software or hardware solutions
Data Loss Prevention (DLP)
42
Types of DLP (Data Loss Prevention) Systems
Endpoint DLP System Network DLP System Storage DLP System Cloud-Based DLP System