Domain-2 Flashcards
Application Encryption
Encryption engine is in the application using the database
Transparent Encryption
Encryption engine is within the database
common challenge w/key management
- Access to the key
- Key storage
- Backup & replication
Key escrow & management considerations
take into account of all relevant laws, regulations, & jurisdiction requirements
When possible key management should be conducted separately from CSP, why?
to enforce SOD & force collusion if unauthorized data access is attempted
Tokenization
The process of replacing sensitive data element with nonsensitive equivalent
Anonymization
The process of removing the direct identifiers in order to prevent data analysis tools from collating or pulling data from multiple sources to identify an individual or sensitive information.
Data Masking/Obfuscation
The process of hiding, omitting or replacing sensitive data from a data set.
Bit splitting
Splitting up & storing encrypted information across different cloud storage services.
Classification
The process of determining the impact of the loss of CIA of the information/asset to an organization
Labeling
referred to as tagging the data with additional information (department, location, and creator). One of the labeling options can be classification according to a certain criteria such as top secret, secret, or classified.
Classified data (Government/Military)
- Top secret
- Secret
- Confidential
Controller
determines the purposes & means of the processing of personal data
Processor
processes personal data on behalf of the controller
IRM protects files from
unauthorized copying, viewing, printing, forwarding, deleting, and editing