Technical Data and Privacy Controls Flashcards

1
Q

An access control model can be applied to any type of data or software resource
o File system security
o Network security
o Database security

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

incorrect permissions allocated to a resource can cause a data breach
o Windows
o Linux

A

File System Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A command-line tool for showing and modifying file permissions
▪ N - No access
▪ F – Full access
▪ R – Read-only
▪ RX – Read and execute
▪ M – Modify
▪ W – Write
▪ D – Delete

A

icacls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ability to access and view the contents of a file or list the contents
of a directory

A

Read (r)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ability to save changes to a file, or create, rename, and delete files
in a directory
(deleting requires execute)

A

Write (w)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ability to run a script, program, or other software file, or the ability
to access a directory, execute a file from that directory, or perform a
task on that directory

A

Execute (x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

These permissions determine what the file’s owner can do with the file

A

Owner Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

These permissions determine what members of the file’s group who are
not its owner can do with the file

A

Group Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These permissions determine what users who are not the file’s owner
or members of its group can do with the file

A

World or Other Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A Linux command that is used to modify permissions for files

A

chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A Linux command that is used to modify the owner of a file

A

chown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inactive data that is stored physically in any digital form

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that is actively being transmitted over a network

A

Data in Transit (or Data in Motion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active data which is stored in a non-persistent digital state typically in
computer random-access memory (RAM), CPU caches, or CPU registers

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A software solution that detects and prevents sensitive information from being
stored on unauthorized systems or transmitted over unauthorized networks
▪ Policy server
▪ Endpoint agents
▪ Network agents

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A rule based on a confidentiality classification tag or label attached to
the data

A

Classification

17
Q

A set of patterns that should be matched

A

Dictionary

18
Q

A template contains dictionaries optimized for data points in a
regulatory or legislative schema

A

Policy Template

19
Q

A structured database of string values to match

A

Exact Data Match (EDM)

20
Q

Matching based on an entire or partial document based on hashes

A

Document Matching

21
Q

A further refinement of partial document matching is to use machine
learning to analyze a range of data sources

A

Statistical/Lexicon

22
Q

Methods and technologies that remove identifying information from data before
it is distributed

A

Deidentification

23
Q

A deidentification method where generic or placeholder labels are substituted for
real data while preserving the structure or format of the original data

A

Data Masking

24
Q

A deidentification method where a unique token is substituted for real data

A

Tokenization

25
Q

A deidentification technique where data is generalized to protect the individuals
involved

A

Aggregation/Banding

26
Q

An attack that combines a deidentified dataset with other data sources to
discover how secure the deidentification method used is

A

Reidentification

27
Q

Copyright protection technologies for digital media which attempts to mitigating
the risk of unauthorized copies being distributed

A

Digital Rights Management (DRM)

28
Q

Methods and technologies that apply a unique anti-tamper signature or message
to a copy of a document

A

Watermarking

29
Q

A digital watermark can defeat attempts at removal by cropping pages or images
in the file

A

Forensic Watermark