Security Architecture 3.3 Flashcards

1
Q

Data Types - Regulated

A

Credit card information
Managed by third-party
Government laws, regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Types - Trade secrets

A

An organisations secret formulas
Often unique to an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intellectual Property

A

May be publicly visible
Copyright and trademark law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data types - Legal information

A

Court records and documents
PII and other sensitive details
Usually stored in many different systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data types - Financial Information

A

Internal company financial details
Customer financials
Payment records
Credit card data, bank records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Human readable / Non-human readable

A

Non human-readable - Barcodes, Encoded Data, images, QR codes
Human readbale - Plain text or numbers that humans can read.
Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Classifying sensitive data

A

Some data may have different levels of classification.

Different levels require different security and handling
- Additional permission
-A different process to view
- Restricted network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data classifications- Proprietary

A

Proprietary
Data that is the property of an organisation
May also include trade secrets
Often data unique to an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Classifications - PII

A

Personally Identifiable information.
Data that can be used to identify an individual. Name, DOB, Biometric information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data classifications - PHI

A

Health information associated with an individual
Health status, health care records, payments for health care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data classifications with examples

A

Sensitive - Intellectual Property
Confidential - Very sensitive, must be approved to view
Public - No restrictions on viewing the data
Private - Restricted access, mat require an NDA
Critical - Data that should always be available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

States of data - Data at rest.

A

Data stored on a storage device. - Hard Drive, SSD, Flash drive.

Encrypt data. whole disk, database encryptions or file and folder level encryption.

Apply Permissions
- Access control lists
- Only authorised users can access the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data in transit

A

Should always be encrypted. Firewalls or IPS

Provide transport encryption
TLS (Transport Layer Security)
IPsec (Internet Protocol Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data in Use

A

Data is actively processing in memory. The data is almost always decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data sovereignty

A

Data that resides in a country is subject to the laws of that country
Legal Monitoring, court orders.
Laws may prohibit where data is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geolocation

A

Can be used to manage data access, limit administrative tasks unless secure area is used.

17
Q

Method to secure data -Geographic Restrictions

A

Identify based on IP subnet, Can be difficult with mobile phones.

Geolocation works with GPS to get an accurate location description.

Geofencing - Allowing or restricting based on a particular location.

18
Q

Methods to secure data - encryption

A

Encode Information into unreadable data
Original information is plaintext encrypted to ciphertext.

Must be able to decrypt original data.

19
Q

Methods to secure data - Hashing

A

Represent data as a string of text. Impossible to recover the original message from the hash.
Can be a digital signature - Authentication, non-repudiation.

20
Q

Obfuscation - Methods to secure data

A

Make something normally understandable very difficult to understand.

21
Q

Masking -Methods to secure data

A

A type of obfuscation to hide original data. Done on receipts.

22
Q

Tokenisation

A

Replace sensitive data with a on sensitive placeholder. There is no encryption or hashing algorithm which lowers overhead.

23
Q

Segmentation

A

Many organisations use a data source. One breach puts all of the data at risk. Separate the data into smaller pieces and store it in different locations

Sensitive data should have stronger security. The most sensitive data must be most secure.

24
Q

Permission restrictions

A

Control access to an account
The authentication process, password policies, authentication factor policies, other considerations.

25
Q
A