Chapter 5 Flashcards
(81 cards)
Any data that isn’t public or unclassified
Sensitive Data
information that can identify an individual
PII
any health-related information that can be related to a specific person
PHI
data that helps an organization maintain a competetive edge
ie software code, trade secrets, intellectual property
Proprietary Data
disclosure would cause exceptionally grave damage to national security
top secret
disclosure would cause serious damage to national security
secret
disclosure would cause damage to national security
confidential
NGO classification for exceptionally grave damage
Confidential/Proprietary
NGO classification for serious damage
Private
NGO classification for damage
Sensitive
NGO classification for no damage
Public
data stored on media
Data at Rest
What kind of encryption protects data at rest?
Strong, symmetric encryption
data transmitted over a network
data in transit
what kind of encryption protects data in transit?
a combination of symmetric and asymmetric encryption
data in memory or temporary storage buffers
Data in Use
what kind of encryption protects data in use?
usually unencrypted (o.o)
sometimes homomoprhic encryption
what is the best way to protect confidentiality of data?
strong encryption paired with strong authentication and authorization controls.
person filling this role ensures that the organization is conducting all business activities by following the laws and regulations that apply to the organization
compliance officer
Security administrators use the _____ defined in the security police to identify security ______.
requirements
security controls
DLP
Data Loss Prevention
event in which an unauthorized entity can view or access sensitive data
data breach
ongoing efforts to organize and care for data throughout its lifetime
data maintenance
What does this describe?
One network process unclassified data only. Another network processes classified data only. The two networks never physically touch each other.
Air Gap - a physical security control