Security Architecture: Data Considerations Flashcards
What are the three types of Data States?
There are three types of data states:
Data at rest.
Data in transit.
Data in use.
What is Data Sovereignty?
Data sovereignty refers to the concept that individuals, organizations, or governments have the inherent right and control over the data generated, processed, and stored within their respective jurisdictions. It emphasizes the authority of data owners to determine how their data is collected, utilized, and shared, ensuring that sensitive information remains subject to local regulations and laws.
In an era marked by increasing digital interconnectedness, data sovereignty addresses concerns about privacy, security, and jurisdictional boundaries.
What is Geolocation?
Geolocation refers to the process of associating location-based information with various data points that an organization generates, collects, or utilizes. This integration of geographic coordinates, such as latitude and longitude, enhances the contextual understanding of the data, allowing businesses to gain valuable insights into the spatial patterns, trends, and relationships within their operations.
Geolocation enables enterprises to visualize and analyze data in geographic contexts, aiding in decision-making, resource allocation, and strategic planning.
Microsoft Azure –conditional access decision based on geolocation eg if the data is located in China filter out (certain things)
Consideration of Privacy concerns – applications are recorded and considered of privacy.
Federal and State laws in regards to data regulations
Import exports encryptions – Trade market – Avoidance of coinciding on influencing on dangerous groups like terrorist.
What is Data at rest?
Concerns of Data Storage and how to secure it
What is Data at Transit?
How can you securely move data in transit
Think of all the potential surface attacks such as man in the middle attack.
What is Data In use?
Data in Use:
How to secure while you use the Data
Eg new Microsoft tech – Windows 11 mode web browser virtualized sand box web browser
App locker windows feature (app will run the protected environment)