Technical Data and Privacy Controls Flashcards

1
Q

An access control model can be applied to any type of data or software resource
o File system security
o Network security
o Database security

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

incorrect permissions allocated to a resource can cause a data breach
o Windows
o Linux

A

File System Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A command-line tool for showing and modifying file permissions
▪ N - No access
▪ F – Full access
▪ R – Read-only
▪ RX – Read and execute
▪ M – Modify
▪ W – Write
▪ D – Delete

A

icacls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ability to access and view the contents of a file or list the contents
of a directory

A

Read (r)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ability to save changes to a file, or create, rename, and delete files
in a directory
(deleting requires execute)

A

Write (w)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ability to run a script, program, or other software file, or the ability
to access a directory, execute a file from that directory, or perform a
task on that directory

A

Execute (x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These permissions determine what the file’s owner can do with the file

A

Owner Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These permissions determine what members of the file’s group who are
not its owner can do with the file

A

Group Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These permissions determine what users who are not the file’s owner
or members of its group can do with the file

A

World or Other Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Linux command that is used to modify permissions for files

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Linux command that is used to modify the owner of a file

A

chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inactive data that is stored physically in any digital form

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that is actively being transmitted over a network

A

Data in Transit (or Data in Motion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active data which is stored in a non-persistent digital state typically in
computer random-access memory (RAM), CPU caches, or CPU registers

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A software solution that detects and prevents sensitive information from being
stored on unauthorized systems or transmitted over unauthorized networks
▪ Policy server
▪ Endpoint agents
▪ Network agents

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A rule based on a confidentiality classification tag or label attached to
the data

A

Classification

17
Q

A set of patterns that should be matched

A

Dictionary

18
Q

A template contains dictionaries optimized for data points in a
regulatory or legislative schema

A

Policy Template

19
Q

A structured database of string values to match

A

Exact Data Match (EDM)

20
Q

Matching based on an entire or partial document based on hashes

A

Document Matching

21
Q

A further refinement of partial document matching is to use machine
learning to analyze a range of data sources

A

Statistical/Lexicon

22
Q

Methods and technologies that remove identifying information from data before
it is distributed

A

Deidentification

23
Q

A deidentification method where generic or placeholder labels are substituted for
real data while preserving the structure or format of the original data

A

Data Masking

24
Q

A deidentification method where a unique token is substituted for real data

A

Tokenization

25
A deidentification technique where data is generalized to protect the individuals involved
Aggregation/Banding
26
An attack that combines a deidentified dataset with other data sources to discover how secure the deidentification method used is
Reidentification
27
Copyright protection technologies for digital media which attempts to mitigating the risk of unauthorized copies being distributed
Digital Rights Management (DRM)
28
Methods and technologies that apply a unique anti-tamper signature or message to a copy of a document
Watermarking
29
A digital watermark can defeat attempts at removal by cropping pages or images in the file
Forensic Watermark