Section 7.65 Securing Data Flashcards
Objectives 14 Explain the importance of using appropriate cryptographic solutions. Objectives 3.3 Compare and contrast strategies to protect data. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management. Objectives 4.4 Explain security alerting, monitoring concepts and tools. Objectives 5.1 Summarise elements of effective security governance.
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Geographic Restrictions (Geofencing)
■ Virtual boundaries to restrict data access based on location
■ Helps Compliance with data sovereignty laws
■ Prevent unauthorized access from high-risk locations
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Encryption
■ Transform plaintext into ciphertext using algorithms and keys
■ Protects data at rest and in transit
■ Requires decryption key for data recovery
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Hashing
■ Converts data into fixed-size hash values
■ Irreversible one-way function
■ Commonly used for password storage
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Masking
■ Replace some or all data with placeholders (e.g., “x”)
■ Partially retains metadata for analysis
■ Irreversible de-identification method
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Tokenization
■ Replace sensitive data with non-sensitive tokens
■ Original data stored securely in a separate database
■ Often used in payment processing for credit card protection
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Obfuscation
■ Make data unclear or unintelligible
■ Various techniques, including encryption, masking, and pseudonyms
■ Hinder unauthorized understanding
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Segmentation
■ Divide network into separate segments with unique security controls
■ Prevent lateral movement in case of a breach
■ Limits potential damage
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Permission Restrictions
■ Define data access and actions through ACLs or RBAC
■ Restrict access to authorized users
■ Reduce risk of internal data breaches