Security And the Information Life Cycle Flashcards

1
Q

Information Life Cycle

A

Security involved at every phase Data collection.
- Consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Implementation depends on regulations/standards.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Life cycle phases?

A

Collect, Store, Process, Share, Archive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personally, Identifiable Information (PII)
One or more pieces of sensitive information that can be traced back to an individual.

A

-Social security number
-Email address
-Credit card number
-Home address
-Web browser cookie containing sensitive session identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Protected Health Information (PHI)?

A

One or more pieces of sensitive medical information that can be traced back to an individual.

-Health insurance plan number
-Blood type
-Patient medical ailments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Privacy-Enhancing Technologies

A

-Anonymization
-The GDPR allows anonymized data collection and use without user consent.
-Anonymized data has limited marketing value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anonymization Techniques

A

Pseudo-anonymization - Replace PII with fake identifiers.

Data minimization - Limit stored/retained sensitive data.

Tokenization - A digital token authorizes access instead of the original credentials.

Data Masking - Hide sensitive data from unauthorized users. Masked out credit card numbers digits on receipt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Sovereignty

A

Location of data and laws that apply to it
-Where did the data originate?
-Where does the data reside?
-Which laws/regulations apply to the data?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Destruction

A

Paper, film, magnetic tape.
Burning, pulping, Shredding(pulverizing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital Data Destruction

A

Failed or decommissioned storage devices storage device end-of-life policies.

Reuse? donate? destroy?

update asset inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Media Sanitization

A

Data is still recoverable. deleted files, repartitioned or reformatted drives.

Disk wiping tools - SSD and HD multiple pass disk overwrites. HD only degaussing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic erasure

A

-Destroy storage media decryption key

-Self-encrypting drives (SEDs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly