DATA Protection Flashcards
What is data protection?
Safeguarding intel from corruption compromise or lost.
What is data classification?
Based on value on the org and how sensitive the info is.
Data owner is the one that determines this level.
Public Data
Has no impact due to being open source to everyone.
Sensitive Data
Has minimal impact like org finance data.
Private Data
Personal record salary etc within the organization.
Confidential Data
Trade secrets, source code can really affect the business if released.
Critical Data
Very valuable like credit card numbers it is very important to not have this release.
Sensitive but unclassified
Would hurt national security people but rather the people that is in the org.
Confidential
Data that could harm the goverment if it gets realsed.
Secret
Damage in national security knowing deployments etc.
Top Secret
Blue prints for weapons or etc that can harm alot of people and places.
Data Owenership
Process of who is responsible for the C.I.A OF the intel.
Data Owner
Senior exec role, maintains CIA of the asset.Makes the rules on how to control things.
Data Controller
Hold responsibility for deciding the purposes and methods of data storage collection and usage. Accountable for any breaches
Data Processor
Group or indiviudal hired by data controller. Help with task to store analayze data sup by controller.
Data Steward
Works for the data owner, making sure everything is classified correctly.
Data Custodian
Enforces access controls. SYSadmin follow the requriments of owner.
Privacy Officer
Incharge of PII phi etc. Oversights it and will be on the hook if a breach happens.Do legal work on following protocols.
Data at rest
Any data that is stored in databases file systems and storage does not move. Threat actors want to get this.
Full disk encryption
Encrypts the entire hard drive.
Partition Encryptuon
Encrypts partitions of a hard drive leaving other unencrypted
File Encryption
Encrypting indivual files when needed to be secured.
Volume encryption
Encrtyps set of slected files or directiores.
Database Encryption
Encrypts data stored in data base
Record Encryption
Specificl files within a data baseD
Data in trasit
Data moving from one location to another.
SSL & TLS
VPNS
IPSEC
SSL & TLS
cryptographic protocols designed to provide secure communication over computer network.Web browsing emails etc
VPN
Creats secure connection over a less secure network.
IPSEC
Used to secure IP communication by authentication and encrypting each ip packet in a data stream.
Regulated Data
Control by laws regulation or industry starndards.
DATA IN USE
Data actively being processed.
TRADE SECRETS
BUSINESS INFO THAT provides company with a competitive edge.
Intellectual Property
Creations by the mind covered by patents trademarks etc.
Legal Info
Data related to legal proceedings.
Financial Info
Data realted to an org financial transaction,sales invoices etc.
Data Soverignty
Digital info is subject to laws of the country in which it is located.
GDPR
GENERAL DATA PROTECTION REGULATION.
Masking
Replacing some or all data in field with a place holder to conceal the data.
DLP
Data loss prevention, set up to monitor data in system while in use transit or rest.
Endpoint DLP SYSTEM
Piece of software in workstation or laptop that is going to monitor data that is in use of the computer.If a file transfer happens it will stop or do an alert like a IDS IPS can be set for detection or prevention moce
Network DLP system
Checks the data going in and out for the network.
Storage DLP
Software installed on server in data center and inspects the data while in the server.
Cloud Based DLP
Is a SaAs is apart of the cloud service and storage needs.
DATA IN FLUX
The three recognized states of data in the context of data security are data at rest (data that is stored), data in use (data that is currently being processed), and data in transit (data that is being transferred from one location to another). “Data in flux” is not a recognized state of data.