Data Security Flashcards

1
Q

Data States

A
  • Data at Rest
  • Data in Motion
  • Data in Use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIST SP 800-111

A

Guide to Storage Encryption Technologies for End User Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Scoping vs Tailoring

A

Scoping is the process of taking a broader standard and trimming out the irrelevant or otherwise unwanted parts.

Tailoring, on the other hand, is when you make changes to specific provisions so they better address your requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital Asset Management

A

Is the process by which organizations ensure their digital assets are properly stored, well protected, and easily available to authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Asset Management typically involves the following tasks:

A
  • Tracking
  • Effectively implementing access controls
  • Tracking the number and location of backup version
  • Documenting the history of changes
  • Ensuring environmental conditions do not endanger storage media
  • Inventory of digital assets
  • Carrying out secure disposal activities
  • Internal and External labeling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Rights Management (DRM) refers to…

A

A set of technologies that is applied to controlling access to copyrighted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Steganography?

A

Is a method of hiding data in another media type so the very existence of the data is concealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three-Components involved in Steganography

A
  • Carrier: A signal, data stream, or file that has hidden in information (payload) inside of it
  • Stegomedium: The medium in which the information is hidden
  • Payload: the information that is to be concealed and transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lease Significant Bit (LSB)

A

A method of embedding the message into some types of media is to use the LSB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Loss is a

A

The flow of sensitive information, such as PII, to unauthorized external parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Loss Prevention (DLP)

A

Compromises the actions that organizations take to prevent unauthorized external parties from gaining access to sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Leak means

A

That the confidentiality of the data had been compromised (e.g., when the laptop thief posts the files on the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

General DLP approach:

A
  • Data inventories (identifying sensitive data)
  • Data Flows
  • Data Protection Strategy
    (Risk Assessment)
    • Backup and recovery
    • Data Life Cycle
    • Physical Security
    • Security Culture
    • Privacy
    • Organizational Change
  • Implementing, Testing, and Tuning
    • Sensitive data awareness
    • Policy engine
    • Interoperability
    • Accuracy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network DLP (NDLP)

A

NDLP Products are normally implemented as appliances that are deployed at the perimeter of an organization’s networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Endpoint DLP Applies

A
  • Protection policies to data at rest and data in use.
  • this software usually called “DLP Agent”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hybrid DLP means

A

NDLP + EDLP

17
Q

CASB - Cloud Access Security Broker

A

Is a system that provides visibility and security controls for cloud services.

18
Q

CASB do their work by leveraging one or two techniques:

A

Proxies or API (Application Programming Interfaces)