Security Architecture: Data Considerations Flashcards

1
Q

What are the three types of Data States?

A

There are three types of data states:

Data at rest.

Data in transit.

Data in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Data Sovereignty?

A

Data sovereignty refers to the concept that individuals, organizations, or governments have the inherent right and control over the data generated, processed, and stored within their respective jurisdictions. It emphasizes the authority of data owners to determine how their data is collected, utilized, and shared, ensuring that sensitive information remains subject to local regulations and laws.

In an era marked by increasing digital interconnectedness, data sovereignty addresses concerns about privacy, security, and jurisdictional boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Geolocation?

A

Geolocation refers to the process of associating location-based information with various data points that an organization generates, collects, or utilizes. This integration of geographic coordinates, such as latitude and longitude, enhances the contextual understanding of the data, allowing businesses to gain valuable insights into the spatial patterns, trends, and relationships within their operations.

Geolocation enables enterprises to visualize and analyze data in geographic contexts, aiding in decision-making, resource allocation, and strategic planning.

Microsoft Azure –conditional access decision based on geolocation eg if the data is located in China filter out (certain things)

Consideration of Privacy concerns – applications are recorded and considered of privacy.

Federal and State laws in regards to data regulations

Import exports encryptions – Trade market – Avoidance of coinciding on influencing on dangerous groups like terrorist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Data at rest?

A

Concerns of Data Storage and how to secure it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data at Transit?

A

How can you securely move data in transit

Think of all the potential surface attacks such as man in the middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data In use?

A

Data in Use:

How to secure while you use the Data

Eg new Microsoft tech – Windows 11 mode web browser virtualized sand box web browser

App locker windows feature (app will run the protected environment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly