Chapter 3 - Data Classification Flashcards

1
Q

Who is the data owner?

A

The organization that collected or created the data. Normally it is the cloud customer.

Also known as data controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is the data custodian?

A

A person or organization who manipulates, stores or moves the data on behalf of the data owner. Usual in cloud it is the cloud provider.

Also known as data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the six stages of the data life cycle?

A

Create, store, use, share, archive , delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data might be categorized by…

A

Regulatory compliance, business function, functional unit or by project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data might be classifieds by…

A

Sensitivity, jurisdiction, criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 3 Data discovery methods

A

Label -based discovery, metadata-based discovery, content-based discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 3 data analytic Tools

A

Datamining, real-time analytics, agile business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Rights Management

A

Intellectual property & copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Exceptions to copyright exclusivity

A

Fair use:

  • academic fair use
  • critique
  • news reporting
  • scholarly research

Satire:

Library preservation: copies to preserve work itself

Personal backup: copy if Orginal licensed version fails. Explicitly includes computer programs

Version for people with physical disabilities: E.g. audio copy of a book for someone that is blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Techniques and technologies of DRM

A
  • Rudimentary reference checks (e.g. password in Vintage Computer Games)
  • online reference Checks (Windows product key)
  • local agent checks (steam local agent that checks use system against online dB)
  • presence of licensed media (requires presence of licensed media e.g. a disk. DRM is installed installed and encrypted on media)
  • support-based Licensing (unlicensed content doesn’t get support)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DRM challenges in the Cloud

A
  • replication restriction (vms must be replicated but interferes with den tool)
  • jurisdictional conflicts (local rights vs sharing data across borders)
  • agent/Enterprise conflicts (local agent vs. Installation in cloud and byod)
  • IAM and DRM Mapping (drm iam and Cloud Imam may have conflicts because of additional layer of access control)
  • api conflicts (drm incorporated in content might not offer same performance across different applications)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Obligatory DRM functions independent of content or format

A
  • persistent protection (should protect content regardless of location or if it’s the original or a copy)
  • dynamic policy control (should enable cloud creators and owners to modify ACLs)
  • automatic expiration (should cease with cease of legal protection)
  • continuous auditing (should allow continuous monitoring of use and access history)
  • replication restriction (should under all circumstances prevent illegal duplication)
  • Remote Rights revocation (owner should be able to revoke rights at any time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Control - Data Retention

A
  • Retention periods
  • applicable regulations (applicable local regulations)
  • retention formats (eg encrypted or not)
  • data classification
  • archiving and retrieval procedures
  • monitoring, maintenance and enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Control - Data Audit

A

Should be considered: periods, scope, responsibilities, processes and procedures, applicable regulations and monitoring, maintenance and enforcement

Challenges while reading logs:

  • not a priority
  • Boring because repetitive work
  • find the Right Person: junior because of costs but some Junior with knowledge about the firm
  • needs to have an understanding of the operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Control - Data Destruction/Disposal

A
  • physical destruction
  • degaussing (Magnetfeld)
  • overwriting
  • cryptoshredding (encrypt data, encrypt keys with another algorithm and destroy keys)

In cloud: Cryptoshredding is the only applicable variant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly