Section 7.65 Securing Data Flashcards

Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.

1
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Geographic Restrictions (Geofencing)

A

■ Virtual boundaries to restrict data access based on location

■ Helps Compliance with data sovereignty laws

■ Prevent unauthorized access from high-risk locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Encryption

A

■ Transform plaintext into ciphertext using algorithms and keys

■ Protects data at rest and in transit

■ Requires decryption key for data recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Hashing

A

■ Converts data into fixed-size hash values

■ Irreversible one-way function

■ Commonly used for password storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Masking

A

■ Replace some or all data with placeholders (e.g., “x”)

■ Partially retains metadata for analysis

■ Irreversible de-identification method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Tokenization

A

■ Replace sensitive data with non-sensitive tokens

■ Original data stored securely in a separate database

■ Often used in payment processing for credit card protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Obfuscation

A

■ Make data unclear or unintelligible

■ Various techniques, including encryption, masking, and pseudonyms

■ Hinder unauthorized understanding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Segmentation

A

■ Divide network into separate segments with unique security controls

■ Prevent lateral movement in case of a breach

■ Limits potential damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Securing Data: methods to secure data S.T.O.P.E.M.G.H

Permission Restrictions

A

■ Define data access and actions through ACLs or RBAC

■ Restrict access to authorized users

■ Reduce risk of internal data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly