3.3 Compare and contrast concepts and strategies to protect data. Flashcards

(39 cards)

1
Q
  • Data types
A
  • Regulated
  • Trade secret
  • Intellectual property
  • Legal information
  • Financial information
  • Human- and non-human - readable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Regulated Data

A

■ Controlled by laws, regulations, or industry standards
■ Compliance requirements
● General Data Protection Regulation (GDPR)
● Health Insurance Portability and Accountability Act (HIPAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PII (Personal Identification Information)

A

■ Information used to identify an individual (e.g., names, social security numbers,
addresses)
■ Targeted by cybercriminals and protected by privacy laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

○ PHI (Protected Health Information)

A

■ Information about health status, healthcare provision, or payment linked to a
specific individual
■ Protected under HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trade Secrets

A

■ Confidential business information giving a competitive edge (e.g., manufacturing
processes, marketing strategies, proprietary software)
■ Legally protected; unauthorized disclosure results in penalties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intellectual Property (IP)

A

■ Creations of the mind (e.g., inventions, literary works, designs)
■ Protected by patents, copyrights, trademarks to encourage innovation
■ Unauthorized use can lead to legal action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Legal Information

A

■ Data related to legal proceedings, contracts, regulatory compliance

Requires high-level protection for client confidentiality and legal privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

○ Financial Information

A

■ Data related to financial transactions (e.g., sales records, tax documents, bank
statements)
■ Targeted by cybercriminals for fraud and identity theft
■ Subject to PCI DSS (Payment Card Industry Data Security Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Human-Readable Data

A

■ Understandable directly by humans (e.g., text documents, spreadsheets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Non-Human-Readable Data

A

■ Requires machine or software to interpret (e.g., binary code, machine language)
■ Contains sensitive information and requires protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data classifications

A
  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Restricted data

A

is highly confidential business or personal information. There are often general statutory, regulatory or contractual requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sensitive Data

A

Information that, if accessed by unauthorized persons, can result in the loss of
security or competitive advantage for a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

○ Importance of Data Classification

A

■ Helps allocate appropriate protection resources
■ Prevents over-classification to avoid excessive costs
■ Requires proper policies to identify and classify data accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Public

A

● No impact if released; often publicly accessible data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private

A

● Contains internal personnel or salary information

17
Q

Confidential

A

● Holds trade secrets, intellectual property, source code, etc.

18
Q

■ Critical

A

● Extremely valuable and restricted information

19
Q

Commercial Business Data Classification Levels

A

Public: often publicly accessible data
Sensitive: Minimal impact if released, e.g., financial data

Private : Contains internal personnel or salary information

Confidential : Holds trade secrets, intellectual property, source code, etc.

Critical : Extremely valuable and restricted information

20
Q

Government Classification Levels

A

■ Unclassified
● Generally releasable to the public

■ Sensitive but Unclassified
● Includes medical records, personnel files, etc.

■ Confidential
● Contains information that could affect the government

■ Secret
● Holds data like military deployment plans, defensive postures

■ Top Secret
● Highest level, includes highly sensitive national security information

21
Q

General data considerations

A
  • Data states
    o Data at rest
    o Data in transit
    o Data in use
  • Data sovereignty
  • Geolocation
22
Q

Data Sovereignty

A

■ Information subject to laws and governance structures within the nation it is
collected

23
Q

Data at Rest

A

■ Data stored in databases, file systems, or storage systems, not actively moving

24
Q

Data in Transit (Data in Motion)

A

Data actively moving from one location to another, vulnerable to interception

25
Transport Encryption Methods
- SSL (Secure Sockets Layer) and TLS (Transport Layer Security) - VPN (Virtual Private Network) - IPSec (Internet Protocol Security)
26
SSL (Secure Sockets Layer) and TLS (Transport Layer Security)
○ Secure communication over networks, widely used in web browsing and email
27
VPN (Virtual Private Network)
○ Creates secure connections over less secure networks like the internet
28
IPSec (Internet Protocol Security)
○ Secures IP communications by authenticating and encrypting IP packets
29
Data in Use
■ Data actively being created, retrieved, updated, or deleted
30
Data in Use Protection Measures
● Encryption at the Application Level ○ Encrypts data during processing ● Access Controls ○ Restricts access to data during processing ● Secure Enclaves ○ Isolated environments for processing sensitive data ● Mechanisms like INTEL Software Guard ○ Encrypts data in memory to prevent unauthorized access
31
* Methods to secure data
- Geographic restrictions - Encryption - Hashing - Masking - Tokenization - Obfuscation - Segmentation - Permission restrictions
32
Geographic Restrictions (Geofencing)
■ Virtual boundaries to restrict data access based on location ■ Compliance with data sovereignty laws ■ Prevent unauthorized access from high-risk locations
33
Encryption
■ Transform plaintext into ciphertext using algorithms and keys ■ Protects data at rest and in transit ■ Requires decryption key for data recovery
34
Hashing
■ Converts data into fixed-size hash values ■ Irreversible one-way function ■ Commonly used for password storage
35
Masking
■ Replace some or all data with placeholders (e.g., "x") ■ Partially retains metadata for analysis ■ Irreversible de-identification method
36
Tokenization
■ Replace sensitive data with non-sensitive tokens ■ Original data stored securely in a separate database ■ Often used in payment processing for credit card protection
37
Obfuscation
■ Make data unclear or unintelligible ■ Various techniques, including encryption, masking, and pseudonyms ■ Hinder unauthorized understanding
38
Segmentation
■ Divide network into separate segments with unique security controls ■ Prevent lateral movement in case of a breach ■ Limits potential damage
39
○ Permission Restrictions
■ Define data access and actions through ACLs or RBAC ■ Restrict access to authorized users ■ Reduce risk of internal data breaches