Section 7.62 Data States Flashcards

Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.

1
Q

3 Data states

Data at Rest

DFS

A

Data stored in databases, file systems, or storage systems, not actively moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 Encryption Methods for the data at rest

Encryption Methods for Data at Rest

FPF VDR

A

Full Disk Encryption (FDE): Encrypts the entire hard drive when turned off and decrypts once turned on.

Partition Encryption: Encrypts specific partitions, leaving others unencrypted

File Encryption: Encrypts individual files

Volume Encryption: Encrypts selected files or directories

Database Encryption: Encrypts data stored in a database at column, row, or table levels

Record Encryption: Encrypts specific fields within a database record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 Data states

Data in Transit (Data in Motion)

A

Data actively moving from one location to another such as across the internet or through private network, this information is vulnerable to interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 Encryption Methods for the data at rest

Encryption Methods for Data in Transit

STVI

A

SSL (Secure Sockets Layer) and TLS (Transport Layer Security): Secure communication over networks, widely used in web browsing and email

VPN (Virtual Private Network): Creates secure connections over less secure networks like the internet

IPSec (Internet Protocol Security): Secures IP communications by authenticating and encrypting IP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 Data states

Data in Use

A

Data actively being created, retrieved, updated, or deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Securing Data in Use

Protection Measures

AASI

A

Application Level Encryption: Encrypts data during processing

Access Controls: Restricts access to data during processing

Secure Enclaves: Isolated environments for processing sensitive data

INTEL Software Guard: Encrypts data in memory to prevent unauthorised access

Securing data in use is challenging as data must be decrypted to process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly