Section 7.62 Data States Flashcards
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
3 Data states
Data at Rest
DFS
Data stored in databases, file systems, or storage systems, not actively moving
6 Encryption Methods for the data at rest
Encryption Methods for Data at Rest
FPF VDR
Full Disk Encryption (FDE): Encrypts the entire hard drive when turned off and decrypts once turned on.
Partition Encryption: Encrypts specific partitions, leaving others unencrypted
File Encryption: Encrypts individual files
Volume Encryption: Encrypts selected files or directories
Database Encryption: Encrypts data stored in a database at column, row, or table levels
Record Encryption: Encrypts specific fields within a database record
3 Data states
Data in Transit (Data in Motion)
Data actively moving from one location to another such as across the internet or through private network, this information is vulnerable to interception
3 Encryption Methods for the data at rest
Encryption Methods for Data in Transit
STVI
SSL (Secure Sockets Layer) and TLS (Transport Layer Security): Secure communication over networks, widely used in web browsing and email
VPN (Virtual Private Network): Creates secure connections over less secure networks like the internet
IPSec (Internet Protocol Security): Secures IP communications by authenticating and encrypting IP packets
3 Data states
Data in Use
Data actively being created, retrieved, updated, or deleted
Securing Data in Use
Protection Measures
AASI
Application Level Encryption: Encrypts data during processing
Access Controls: Restricts access to data during processing
Secure Enclaves: Isolated environments for processing sensitive data
INTEL Software Guard: Encrypts data in memory to prevent unauthorised access
Securing data in use is challenging as data must be decrypted to process