Protecting Data (Methods) 3.3 Flashcards

1
Q

One way to secure data is to have […] restrictions
- Identify based on IP subnet (harder with mobile devices)
- 802.11
- GPS

A

Geographic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[…] allows you to automatically allow or restrict access to the network based on the physical location of the device

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An integral part of protecting data, […], allows you to encode information into unreadable data, unless it is […]
- Plain text —> Ciphertext

A

Encryption

Decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Another way to protect data, called […], allows you to represent data as a short string of text (Message digest / Fingerprint). It is impossible to recover the original message from the […]

A

Hashing

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing is used to verify the […] of data, ensuring what you downloaded is the same as the original

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Another way to protect data is through […], which is the process of making easily digestible information much harder to understand (To Humans)

Ex:
A developer makes his perfectly readable code into nonsense, but it still functions the same

A

Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of obfuscation, called […], is used to protect PII and other sensitive data by blocking out certain parts of it

Ex:
Bank Card
****3567

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Another way to protect data is through […], which replaces sensitive data with a non-sensitive placeholder. Very common with credit card processing

Ex:
Use a temporary […] during payment, so if an attacker captures the cc numbers they won’t be able to use it

A

Tokenization

Token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[…] protects your data by not having it all in a single location. If it was all at a single location, one breach would put all of it at risk.

Also allows you to have stronger or weaker security for data of different sensitivity

A

Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tied to whatever account is being used to login, […] allows you to control its access to resources.

A

Permission Restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly