Security Architecture: Methods of Securing Data Flashcards

1
Q

What is geographical restrictions?

A

Geographic restrictions: Refers to constraining data to certain aspects of the organization’s geography.

Sovereignty

Geofence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Encryption: Converts plain text, which is human-readable data, to cipher text.

Works on confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hashing

A

Hashing: Creates a hash that can be compared to the hash on another system, to help guarantee data integrity.

Involves data integrity by comparing different values which needs to match to determine if it is tampered or not by hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Masking

A

Masking: Obfuscates original, sensitive data with realistic but fictitious information to protect its confidentiality while maintaining its usability for testing or analytical purposes. One method of obfuscate.

Masking process: (credit card or audit type systems used this)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tokenization

A

Tokenization: Substitutes sensitive data with unique symbols or tokens, thereby helping to reduce the risk of exposure and helping maintain security during transactions or data storage.

Another way to obfuscate

Token Process (substitute the character with other characters)

Reversable and non reversable:

6 will represent number 3 and build that method (reversable)

Non-Reversable is like masking but not completely masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Obfuscation

A

Obfuscation: Refers to the practice of intentionally making something unclear, confusing, or difficult to understand. This method is often applied to code, text, or information to protect it from unauthorized access or reverse engineering.

Methods: Masking or Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Segmentation

A

Segmentation: Refers to the practice of dividing a computer network into smaller, isolated segments to enhance security, control access, and contain potential breaches or threats.

  • VLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly