Domain 2 Flashcards

1
Q

DLP Challenge

A

Use of encryption for data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Data flow diagrams (DFDs)

data lifespan info is not included

A

Dataflow diagrams are a critical part of organizational understanding of how data is created, moves, and is used throughout an organization. They often include details like ports, protocols, data elements and classification, and other details that can help you understand not only where data is, but how it gets there and what data is in use

Data types, fields or names, services, systems, ports, protocols, and security details are all commonly included in dataflow diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data dispersion risk

A

If data is spread across multiple cloud providers, there is a possibility that an outage at one provider will make the dataset unavailable to users, regardless of location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data labelling at creation and
in-use - if data changes

A

The Use phase of the data lifecycle often includes modification of data, and thus will require labels to change or be added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ephermal data - 45days

A

Ephemeral data is often kept for shorter time periods like 45 days, a time period sufficient to allow investigations without building up large volumes of data that will not be used and which can be expensive to store. Longer-term storage may be required by law or contracts or due to specific contractual requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptoshredding

A

securely erasing all copies of the encryption key is all that it takes to complete the destruction process for crypto-shredding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IRM ( Information rights management)

A

. Information rights management systems typically rely on certificates to identify systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

log data - long term storage

A

Long-term storage is storage that is intended to continue to exist and is often used for logs or data storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ephermal storage

A

Storage that is associated with an instance that will be destroyed when the instance is shut down is ephemeral storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Raw storage

Volume-based storage

A

Raw storage is storage that you have direct access to like a hard drive or an SSD that has access to the underlying device.

Volume-based storage is storage allocated as a virtual drive or device within the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secret management best practices

A

OWASPs Secrets Management Cheatsheet describes three main requirements for “break-glass” secrets backup environments: ensuring automated backups are in place and executed regularly based on the number of secrets and their lifecycle, frequently testing the restore procedures, and encrypting backups and placing them on secure, monitored storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DLP Tagging

A

Tags are an important tool when working with ephemeral systems. While IP addresses may be reused and administrative accounts are likely to be the same across systems, tags can be unique, allowing events to be tracked to an instance. The system’s deletion time should be logged, as should the time it is instantiated, but this obviously wouldn’t be in every log event created by the machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dispersion

A

Dispersion is the concept of ensuring that data is in multiple locations so that a single failure, event, or loss cannot result in the destruction or loss of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Deduplication

A

Deduplication involves removing duplicates from a data set;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

collision

A

Two different files should never generate the same output—this is known as a collision and is not acceptable in a hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IRM which phase

A

IRM can be particularly useful during the sharing stage of the cloud data lifecycle since information rights management tools can ensure privileges and access to data are appropriately managed as data moves around the organization and potentially leaves it.