Enterprise Security Flashcards
cybersecurity process used to ensure the integrity of files, configurations, or system components within an IT environment.
Integrity Measurements check - Integrity verification or integrity monitoring
graphical representation or visualization of a computer network’s topology, architecture, and components. Network diagrams are used to illustrate the physical and logical connections between devices, systems, and infrastructure elements within an organization’s network.
Network Diagram
refers to the concept that data is subject to the laws and regulations of the country or jurisdiction in which it is located or stored.
Data Sovereignty
These rules specify that if data is collected on EU citizens, that data must be stored in the European Union.
GDPR - General Data Protection Regulation
Refers to the process of replacing sensitive or confidential information with fictitious or modified data to protect the original data from unauthorized access or disclosure.
Masking Data
Characteristic of data encryption, means that the information that we are encrypting and putting into the cipher text is very different than what we originally started with the plaintext.
Confusion
Characteristic of data encryption. Means that if you change one piece of information in the plaintext, that the resulting cipher text is going to be dramatically different between these different versions.
Diffusion
refers to data that is stored or persisted in a storage medium, such as a hard drive, solid-state drive (SSD), database, or backup tape, and is not actively being transmitted or processed.
Data at Rest
Data that is moving across the network.
Data in transit
Method used in cybersecurity and data protection to enhance the security of sensitive data by replacing it with a unique identifier called a token.
Tokenization