Módulo 13 - Data Protection and Compliance Flashcards

1
Q

List:
Impacts of non-compliance with data protection laws

A
  1. Legal sanctions
  2. Financial penalties
  3. Legal liabilities
  4. Reputational damage
  5. Loss of customer trust
  6. Increased regulatory scrutiny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List:
Consequences of a data or privacy breach

A
  1. Reputation damage
  2. Identity theft
  3. Fines
  4. Intellectual property (IP) theft
  5. Escalation risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List:
Notifications required in data breaches

A
  1. Regulator
  2. Law enforcement
  3. Affected individuals
  4. Third-party companies
  5. Public (media or social channels)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List:
Impacts of contractual non-compliance

A
  1. Breach of contract
  2. Termination of contracts
  3. Indemnification and liability
  4. Non-compliance penalties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List:
Forms of non-compliance with software licensing

A
  1. Exceeding permitted installations
  2. Unauthorized sharing
  3. Unauthorized usage
  4. Modifying code
  5. Distributing software without authorization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:
Security compliance

A

Adherence to standards, regulations, and practices to protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:
Sanctions

A

Penalties for non-compliance with laws or rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:
Data breach

A

Unauthorized reading, modification, or deletion of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define: Privacy breach

A

Loss or disclosure of personal and sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:
Escalation in data breaches

A

Raising the issue to senior decision-makers for legal and regulatory assessment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:
Indemnification in contracts

A

Shifting liability for damages or legal costs to another party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:
Non-compliance penalties

A

Fines or damages stipulated in contracts for failing cybersecurity measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:
License remediation

A

Correcting non-compliance with software licenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List:
Types of regulated data

A
  1. Financial information
  2. Healthcare records
  3. Social security numbers
  4. Credit card details
  5. Personally identifiable information (PII)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List:
Types of human-readable data

A
  1. Text
  2. Images
  3. Multimedia content
  4. Documents
  5. Reports
  6. Emails
  7. Presentations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List:
Types of non-human-readable data

A
  1. Binary code
  2. Encrypted data
  3. Machine-readable formats
  4. Complex structured data
  5. Encoded information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List:
Security measures for non-human-readable data

A
  1. Encryption
  2. Access controls
  3. Intrusion detection and prevention
  4. Secure data exchange
  5. Code/application security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List:
Data classification levels based on confidentiality

A
  1. Public (unclassified)
  2. Confidential (secret)
  3. Critical (top secret)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List:
Data classification levels for government and military

A
  1. Unclassified
  2. Sensitive
  3. Confidential
  4. Secret
  5. Top Secret
  6. Top Secret Compartmentalized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List:
Examples of private/personal data

A
  1. Names
  2. Addresses
  3. Social security numbers
  4. Financial information
  5. Login credentials
  6. Biometric data
  7. Health records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List:
Categories of proprietary data

A
  1. Intellectual property (IP)
  2. Trade secrets
  3. Product information
  4. Service information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:
Data types

A

Categorization of data based on characteristics and use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:
Regulated data

A

Data subject to legal and regulatory requirements for handling and protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:
Trade secrets

A

Confidential information giving a business a competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define:
Human-readable data

A

Data easily understood by humans, such as text and images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define:
Non-human-readable data

A

Data requiring specialized software to interpret, such as binary or encrypted formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define:
Data classification schema

A

A system to label data based on confidentiality and type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define:
Proprietary information

A

Nonpublic data owned by a company, like intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define:
Restricted data

A

Highly confidential data with stringent access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Acronym:
PCI DSS

A

Payment Card Industry Data Security Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Acronym:
PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

List:
Examples of privacy data

A
  1. Names
  2. Addresses
  3. Contact information
  4. Social security numbers
  5. Medical records
  6. Financial transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

List:
Examples of confidential data

A
  1. Trade secrets
  2. Intellectual property
  3. Financial statements
  4. Proprietary algorithms
  5. Source code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

List:
Rights of data subjects under GDPR

A
  1. Right to access
  2. Right to rectification
  3. Right to erasure
  4. Right to restrict processing
  5. Right to data portability
  6. Right to object
  7. Right to withdraw consent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

List:
Impacts of privacy laws on data inventories and retention

A
  1. Maintaining detailed records
  2. Identifying legal grounds for processing
  3. Ensuring data minimization
  4. Defining retention periods
  5. Responding to data subject requests
  6. Implementing robust security measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

List:
Responsibilities of data processors under GDPR

A
  1. Process data only as instructed by the controller
  2. Implement appropriate security measures
  3. Maintain confidentiality and integrity of data
  4. Keep records of processing activities
  5. Cooperate with data controllers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

List:
Responsibilities of data controllers under GDPR

A
  1. Define purposes and means of processing
  2. Obtain consent from data subjects
  3. Provide privacy notices
  4. Implement data protection policies
  5. Handle data subject requests
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define:
Privacy data

A

Personal information linked to an individual’s identity and privacy rights.

39
Q

Define:
Confidential data

A

Information requiring protection due to business or proprietary sensitivity.

40
Q

Define:
Data controller

A

Entity deciding why and how personal data is processed.

41
Q

Define:
Data processor

A

Entity processing personal data on behalf of the controller.

42
Q

Define:
Data subject

A

Individual whose personal data is being processed.

43
Q

Define:
Right to be forgotten

A

Data subject’s right to request deletion of personal data under certain conditions.

44
Q

Define:
Data minimization

A

Collecting only necessary data for specific and legitimate purposes.

45
Q

Define:
Data inventory

A

Record detailing personal data types, processing purposes, and recipients.

46
Q

List:
Steps in the decommissioning process

A
  1. Data sanitization
  2. Reset to factory settings
  3. Physical destruction of components (if necessary)
  4. Documentation and inventory updates
47
Q

List:
Methods for secure data sanitization

A
  1. Data wiping
  2. Degaussing
  3. Encryption
48
Q

List:
Methods for secure data destruction

A
  1. Shredding
  2. Crushing
  3. Incinerating
  4. Overwriting
49
Q

List:
Circumstances requiring data destruction

A
  1. End of data retention period
  2. Compliance with regulations (e.g., GDPR, HIPAA)
  3. Decommissioning storage devices
  4. Reducing outdated data
50
Q

List:
Key concepts in asset disposal

A
  1. Sanitization
  2. Destruction
  3. Certification
51
Q

List:
Steps to decommission a multifunction network printer

A
  1. Sanitize stored print jobs and documents
  2. Wipe network credentials and configuration data
  3. Perform a full factory reset
  4. Securely dispose of or destroy physical components
  5. Update asset inventory
52
Q

List:
Overwriting steps for HDD sanitization

A
  1. Pass of all zeros
  2. Pass of all ones
  3. Pass in a pseudorandom pattern
53
Q

Define:
Decommissioning

A

Process of securely retiring devices by erasing data and resetting configurations.

54
Q

Define: Data sanitization

A

Removing sensitive information to ensure it cannot be recovered.

55
Q

Define:
Data destruction

A

Physically or electronically eliminating data to make it irrecoverable.

56
Q

Define:
Certification (in asset disposal)

A

Documentation verifying secure data sanitization or destruction.

57
Q

Define:
Overwriting

A

Sanitization method replacing data with patterns of zeros, ones, and random data.

58
Q

Define:
Zero filling

A

Overwriting method setting all bits on a drive to zero.

59
Q

Acronym:
GDPR

A

General Data Protection Regulation

60
Q

Acronym:
HIPAA

A

Health Insurance Portability and Accountability Act

61
Q

List:
Phases of personnel management in HR

A
  1. Recruitment
  2. Operation
  3. Termination/Separation
62
Q

List:
Key components of onboarding

A
  1. Secure transmission of credentials
  2. Asset allocation
  3. Training and policies
63
Q

List:
Processes involved in offboarding

A
  1. Account management
  2. Retrieval of company assets
  3. Wiping personal assets of corporate data
  4. Changing shared credentials
64
Q

List:
Topics covered in security awareness training

A
  1. Security policies and penalties for noncompliance
  2. Incident identification and reporting
  3. Data handling and confidentiality
  4. Password and account management
  5. Social engineering and malware threats
  6. Secure software usage
65
Q

List:
Security training methods

A
  1. Workshops
  2. One-on-one mentoring
  3. Computer-based training (CBT)
  4. Videos and blogs
  5. Simulations
  6. Gamification
66
Q

List:
Security awareness training lifecycle stages

A
  1. Assessing needs and risks
  2. Planning and designing activities
  3. Developing materials
  4. Delivering training
  5. Evaluation and feedback
  6. Reinforcement
  7. Monitoring and adaptation
67
Q

List:
Examples of risky behaviors

A
  1. Clicking on suspicious links
  2. Visiting untrusted websites
  3. Downloading unauthorized software
  4. Sharing credentials
  5. Ignoring software updates
68
Q

List:
Techniques to detect anomalous behavior

A
  1. Network intrusion detection
  2. User behavior analytics
  3. System log analysis
  4. Fraud detection
69
Q

Define:
Acceptable Use Policy (AUP)

A

Guidelines for proper use of organizational equipment and resources.

70
Q

Define:
Onboarding

A

Welcoming and equipping new employees or contractors with tools and training.

71
Q

Define:
Offboarding

A

Process ensuring employees or contractors leave without retaining access or assets.

72
Q

Define:
Clean desk policy

A

Work areas must be free of documents to protect sensitive information.

73
Q

Define:
Anomalous behavior

A

Actions or patterns deviating from normal expectations.

74
Q

Define:
Gamification

A

Using game-like elements in training to improve engagement and learning.

75
Q

Define:
Phishing simulation

A

Simulated attacks to train employees to recognize and respond to phishing.

76
Q

Define:
Shadow IT

A

Unauthorized use of personal software or services in the workplace.

77
Q

List:
States of data for protection measures

A
  1. Data at rest
  2. Data in transit (or motion)
  3. Data in use
78
Q

List:
Components of Data Loss Prevention (DLP)

A
  1. Policy server
  2. Endpoint agents
  3. Network agents
79
Q

List:
Typical remediation mechanisms in DLP

A
  1. Alert only
  2. Block
  3. Quarantine
  4. Tombstone
80
Q

List:
Approaches to maintain data sovereignty compliance

A
  1. Data localization using local datacenters
  2. Contractual agreements with vendors
  3. Location-specific cloud storage facilities
81
Q

List:
Geographic access requirement impacts

A
  1. Data storage locations and sovereignty
  2. Constraint-based access controls
  3. Data replication and dispersion
  4. Jurisdiction-specific legal requirements for forensics
82
Q

List:
Benefits of a data retention policy

A
  1. Reduced discovery costs during litigation
  2. Reduced exposure to potential litigation risks
  3. Lower hardware/software requirements for old data
  4. Protection from evidence destruction accusations
83
Q

List:
Data retention best practices

A
  1. Delete emails after 90 days
  2. Retain tax-related information for seven years
  3. Keep employee records for four years post-employment
  4. Retain research/patents for 25 years
  5. Keep vendor contracts for five years post-expiration
  6. Delete employee files after one year
84
Q

Define:
Data protection

A

Measures to secure data from unauthorized access, loss, or misuse.

85
Q

Define:
Compliance

A

Adherence to legal, regulatory, and industry requirements.

86
Q

Define:
Data at rest

A

Data stored on persistent media, like databases or files.

87
Q

Define:
Data in transit

A

Data transmitted over a network.

88
Q

Define:
Data in use

A

Data present in volatile memory or being processed.

89
Q

Define:
Data sovereignty

A

Jurisdictional control over data storage and processing.

90
Q

Define: DLP policy server

A

Configures classification and privacy rules, logs incidents, and compiles reports.

91
Q

Define:
Tombstone (DLP)

A

Replaces a quarantined file with a notice about the policy violation.

92
Q

Define:
Data retention policy

A

Defines how long data is retained and procedures for archiving or destruction.

93
Q

Define:
Due diligence in data protection

A

Assessing and verifying the adequacy of security and compliance practices.