Lesson 16: Summarize Data Protection and Compliance Concepts Flashcards

1
Q

How does privacy differ from data sensitivity?

A

Privacy emphasizes individual rights, while data sensitivity classifies data based on its confidentiality and potential impact if compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are examples of regulated data?

A

Financial, healthcare, and personal data protected by laws like GDPR, HIPAA, and PCI DSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the importance of trade secrets?

A

They safeguard proprietary information for competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does data format affect security measures?

A

Human-readable data may require content filtering, while non-human-readable data needs encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of data classification schemas?

A

Public, Confidential, Critical, Proprietary, Sensitive, Private, and Restricted classifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data sovereignty?

A

Legal restrictions on storing or processing data outside jurisdictional boundaries, such as GDPR’s cross-border data rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What distinguishes privacy data from confidential data?

A

Privacy data relates to personal information.

Confidential data includes business and proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three states of data, and how are they protected?

A

At Rest: Encrypted and secured on storage media.

In Transit: Protected by transport protocols like TLS or IPSec.

In Use: Safeguarded in volatile memory, often using Trusted Execution Environments (TEEs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What methods protect data?

A

Encryption, hashing, masking, tokenization, obfuscation, segmentation, and permission restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of DLP (Data Loss Prevention)?

A

To prevent unauthorized access and data transfer using policy servers, endpoint agents, and network agents, along with remediation methods like alerts, blocking, quarantines, or tombstones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of an Acceptable Use Policy (AUP)?

A

It provides guidelines for appropriate and secure use of organizational resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a clean desk policy enhance security?

A

It prevents exposure of sensitive documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What role do social media policies and the code of conduct play in personnel management?

A

They promote professional online behavior and secure practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is role-based training, and who benefits from it?

A

Tailored security training for end users, technical staff, and executives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What techniques are used in security training?

A

Gamified CBT methods, simulations, phishing campaigns, and situational awareness exercises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do gamified training techniques enhance security awareness?

A

They engage users effectively by making learning interactive and rewarding, which improves retention of information.

17
Q

Why are hybrid/remote work practices included in personnel policies?

A

To address unique risks associated with off-site work environments, such as unsecured networks and devices.

18
Q

How is the security awareness training lifecycle structured?

A
  1. Assess needs and risks.
  2. Plan and design training.
  3. Develop engaging materials.
  4. Deliver interactive training.
  5. Evaluate effectiveness.
  6. Reinforce awareness with campaigns and reminders.
  7. Monitor and adapt to emerging risks.
19
Q

What regulations and compliance standards do you need to adhere to in cyber security?

A

GDPR, (General Data Protection Regulation)

HIPAA, (Health Insurance Portability and Accountability Act)

CCPA, (California Consumer Privacy Act)

etc.

20
Q

What are the impacts of noncompliance with regulations like GDPR or HIPAA?

A

Fines, reputation damage, contract terminations, and indemnification.

21
Q

What does compliance monitoring and reporting look like?

A

There is Internal, and External compliance evaluations that can be conducted.

There is room to automate the oversight of these compliance evaluations. This ensures consistent adherence to regulations, and improving efficiency in identifying and addressing potential issues.

22
Q

How should data inventories and retention be managed?

A

Ensure lawful processing, enforce data minimization, set retention periods, and manage deletion or anonymization securely.

23
Q

What are examples of cross-border privacy requirements?

A

GDPR’s extraterritorial reach, which governs data regardless of processing location.

24
Q

What are the roles of a data controller and data processor?

A

Data Controller: Determines purposes and means of processing personal data.

Data Processor: Handles data on behalf of the controller.

25
Q

What rights do data subjects have under GDPR?

A

Access, rectification, and erasure of their data.

26
Q

What steps are involved in managing privacy breaches?

A

Notify regulators, law enforcement, and individuals promptly in line with laws like GDPR and HIPAA.

Outline escalation procedures, public disclosures, and remediation strategies.