Data Protection Flashcards

1
Q

What is the importance of data classification?

A

Helps allocate appropriate protection resources and prevents over-classification to avoid excessive costs

Requires proper policies to identify and classify data accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of data is classified as public?

A

No impact if released; often publicly accessible data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What defines sensitive data?

A

Minimal impact if released, e.g., financial data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What information is contained in private data?

A

Internal personnel or salary information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does confidential data hold?

A

Trade secrets, intellectual property, source code, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What characterizes critical data?

A

Extremely valuable and restricted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: Sensitive data has _______ impact if released.

A

minimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Public data has a significant impact if released.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: Critical data is characterized as extremely _______ and restricted information.

A

valuable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data Ownership?

A

Process of identifying the individual responsible for maintaining the confidentiality, integrity, availability, and privacy of information assets

Data ownership is crucial for accountability in data management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who is a Data Owner?

A

A senior executive responsible for labeling information assets and ensuring they are protected with appropriate controls

Data owners play a critical role in establishing data protection policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a Data Controller do?

A

Entity responsible for determining data storage, collection, and usage purposes and methods, as well as ensuring the legality of these processes

Data controllers are key in compliance with data protection laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Data Processor.

A

A group or individual hired by the data controller to assist with tasks like data collection and processing

Data processors must operate under the instructions of the data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a Data Steward?

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and classified, often working under the data owner

Data stewards help maintain data integrity and usability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What responsibilities does a Data Custodian have?

A

Responsible for managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

Data custodians are essential for operational data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a Privacy Officer oversee?

A

Oversees privacy-related data, such as personally identifiable information (PII), sensitive personal information (SPI), or protected health information (PHI), ensuring compliance with legal and regulatory frameworks

Privacy officers are crucial for protecting individual privacy rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who should be designated as Data Owners?

A

Data owners should be designated within their respective departments based on their knowledge of the data and its significance within the organization

Data owners are responsible for the management and oversight of data assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Full Disk Encryption (FDE) do?

Data At Rest

A

Encrypts the entire hard drive

FDE provides comprehensive data protection by encrypting all data on the disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of Partition Encryption?

Data At Rest

A

Encrypts specific partitions, leaving others unencrypted

Useful for protecting sensitive data while allowing access to other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does File Encryption accomplish?

Data At Rest

A

Encrypts individual files

This method is ideal for securing specific documents or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of Volume Encryption?

Data At Rest

A

Encrypts selected files or directories

Allows for targeted encryption without affecting the entire disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Database Encryption?

Data At Rest

A

Encrypts data stored in a database at column, row, or table levels

Protects sensitive information within databases from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does Record Encryption do?

Data At Rest

A

Encrypts specific fields within a database record

This provides granular control over which data is protected.

24
Q

What is the definition of Data at Rest?

A

Data stored in databases, file systems, or storage systems, not actively moving.

25
Q

What is Data in Transit?

A

Data actively moving from one location to another, vulnerable to interception.

26
Q

What are Transport Encryption Methods?

A

Methods used to secure data during transmission, including:
* SSL (Secure Sockets Layer)
* TLS (Transport Layer Security)
* VPN (Virtual Private Network)
* IPSec (Internet Protocol Security)

27
Q

What does SSL stand for?

A

Secure Sockets Layer.

28
Q

What is the purpose of TLS?

A

Secure communication over networks, widely used in web browsing and email.

29
Q

What is the function of a VPN?

A

Creates secure connections over less secure networks like the internet.

30
Q

What does IPSec secure?

A

Secures IP communications by authenticating and encrypting IP packets.

31
Q

True or False: Data in Transit is not vulnerable to interception.

32
Q

What does ‘Data in Use’ refer to?

A

Data actively being created, retrieved, updated, or deleted

33
Q

Data in use protection measures?

A
  • Encryption at the application level
  • Access Control
  • Scure Enclaves
  • INTEL software Guard

INTEL software Guard encryupts dat in memory to prevent unautherized access

34
Q

What are the Data Types

A
  • Regulated Data
  • PII
  • PHI
  • Trade Secrets
  • Intellectual Property (IP)
  • Legal Information
  • Financial Information
  • Human Readable
  • Non-Human Readable
35
Q

What is Data Sovereignty?

A

Digital information subject to laws of the country where it’s located

Data sovereignty emphasizes that data is governed by the legal frameworks of the nation in which it resides.

36
Q

What does GDPR stand for?

A

General Data Protection Regulation

GDPR is a regulation in EU law on data protection and privacy.

37
Q

What is the primary purpose of GDPR?

A

Protects EU citizens’ data within EU and EEA borders

GDPR ensures that individuals have control over their personal data.

38
Q

Is compliance with GDPR required regardless of data location?

A

Yes

Organizations outside the EU that process data of EU citizens must comply with GDPR.

39
Q

What are Geographic Restrictions?

A

Virtual boundaries to restrict data access based on location

Also known as geofencing.

40
Q

What is Encryption?

A

Transform plaintext into ciphertext using algorithms and keys

Essential for data security.

41
Q

What is Hashing commonly used for?

A

Password storage

A method to secure passwords by converting them into a fixed-size string.

42
Q

What does Masking do?

A

Replace some or all data with placeholders (e.g., ‘x’)

Used to protect sensitive information in non-production environments.

43
Q

What is Tokenization?

A

Replace sensitive data with non-sensitive tokens
* Original data stored securely in a separate database
* Often used in payment processing for credit card protection

Helps in reducing the risk of data breaches.

44
Q

What is Obfuscation?

A

Make data unclear or unintelligible

Used to protect sensitive information from unauthorized access.

45
Q

What is Segmentation in network security?

A

Divide network into separate segments with unique security controls
* Prevent lateral movement in case of a breach

Enhances security by limiting access and exposure.

46
Q

What are Permission Restrictions?

A

Define data access and actions through ACLs or RBAC

Access Control Lists (ACLs) and Role-Based Access Control (RBAC) are common methods.

47
Q

What is an Endpoint DLP System?

A

Installed as software on workstations or laptops, monitors data in use on individual computers, can prevent or alert on file transfers based on predefined rules.

48
Q

What does a Network DLP System focus on?

A

Monitoring data entering and leaving the network, detects unauthorized data leaving the network.

49
Q

Where is a Storage DLP System installed?

A

Installed on a server in the data center, inspects data at rest, especially encrypted or watermarked data.

50
Q

What is the primary function of a Cloud-Based DLP System?

A

Protects data stored in cloud services.

51
Q

True or False: An Endpoint DLP System can prevent file transfers based on predefined rules.

52
Q

Fill in the blank: A Storage DLP System monitors data _______.

53
Q

What type of DLP System is installed as software on individual computers?

A

Endpoint DLP System

54
Q

What type of DLP System is placed at the network perimeter?

A

Network DLP System

55
Q

What does a Storage DLP System flag?

A

Policy violations

56
Q

Fill in the blank: A Cloud-Based DLP System is offered as a _______.

A

[software-as-a-service solution]