Data Security Flashcards
What does data security involve?
Data security involves the application of various data security controls to prevent any intentional or unintentional act of data misuse, data destruction, and data modification.
What are the states of data security?
- Data at rest (offline, non-volatile medium)
- Data in use (online, volatile medium)
- Data in transit
Examples of security controls applicable for data at rest
- Data encryption
- Password protection
- Tokenization
- Data federation
Examples of security controls applicable for data in use
- Authentication techniques
- Tight control on this data’s accessibility
- Full/Partial memory encryption
- Strong identity management
Examples of security controls applicable for data in transit
- SSL and TLS
- Email encryption tools such as PGP or S/MIME
- Firewall controls
What are the steps for information management lifecycle?
- Creation
- Organization
- Utilization
- Remediation
- Storage
- Erasure
Data Owners
Individuals or steering committees having complete control over the data in an organization; they are solely responsible for the data assets of the organization.
Data Controller
Person who collects and controls the processing of data provided to the data processor.
Data Processor
Person who collects and controls the processing of data provided to the data processor
Data Steward/Custodian
The data steward is accountable for business data sets, and the data custodian is accountable for technical data assets for the storage and transport of data.
Privacy Officer
Senior executive who is responsible for the privacy of the organization’s data. Maintains privacy policies as well as investigate and track incidents and security loopholes.
Data Protection Officer (DPO)
Ensures that sensitive information on the personnel, customers, or any other individual meets the compliance requirements of the organization.
Data Classification
Process of assigning sensitivity levels to data while the data are being generated, modified, saved, or passed over an information system.
What are data classification levels?
1 - Top secret
2 - Highly confidential information
3 - Proprietary information
4 - Information for internal use
5 - Public documents
Do folders and files have the same NTFS permissions?
No, folders have additional permission “List folder contents”
Command that assigns file access on Linux
setfacl
Command that displays file name, owner, the group and ACL on Linux
getfacl
What permission mask (numeric) would you use for setting read permission on a file for all users?
444
What does 644
permission mask mean?
Only the owner can write, all can read.
What does -rwx------
on a file mean?
Only the owner can read, write and execute.
How to lock the directory only for owners? How the permission triads would look like?
Locked - noone can read, write and execute
chmod 700 <dir>
drwx------ dir
Why the filesystem ACL is not enough to protect data and file encryption should be used?
Plugging the storage media under different device or system is enough to bypass the filesystem ACL.
Does Windows OS have a built-in tool to securely remove files?
Yes, it’s Cipher.cipher /w:filename
Although running on encrypted/decrypted file will just wipe unused space
How does EFS work?
Encrypting File System on Windows works by encrypting files and directories with a symmetric key, and this key is then encrypted with the user’s public key. Only the user who owns the corresponding private key can decrypt the symmetric key and, consequently, access the encrypted files.
How the key used in EFS called? When is it generated? Where is it stored?
File Encryption Key (FEK) is generated for each file/folder being encrypted. It is stored in the encrypted format alongside the file/folder.
What are different database encryption types?
- Transparent/External database encryption
- Column-level encryption
- Symmetric database encryption
- Asymmetric database encryption
How does transparent/external database encryption work?
It uses a symmetric encryption key to encrypt the database and all backups using a database encryption key.
Is symmetric or asymmetric encryption used in bulk encryption?
Always symmetric encryption for large (bulk) data.
Asymmetric encryption is an order of magnitude slower
How does column-level encryption work?
It encrypts the individual columns within the database tables using different encryption keys