Chapter 5 Flashcards

(13 cards)

1
Q

Sensitive Data Types

A

PII
PHI
Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PII

A
  • distinguish individual identify
  • can link to individual; financial, medical, educational, employment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PHI (health)

A
  • created or received by health care provider, plan, employer, etc.
  • past/present/future physical or mental health, provision of or payment for health care
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proprietary Data

A

Trade secrets, software code, internal processes, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Classification

A

Gov’t:
Class 3 - Top secret - grave damage
Class 2 - Secret - serious damage
Class 1 - Confidential - damage
Class 0 - Unclassified - no damage

Organizations:
Class 3 - Confidential/Proprietary - trade secrets, IP
Class 2 - Private - PII, PHI, financial
Class 1 - Sensitive - IT info
Class 0 - Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DLP

A
  1. Network-based
  2. Endpoint-based
  3. Cloud-based

Also includes sensitive info discovery function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data destruction techniques

A
  1. Erasing - not secure
  2. Clearing/overwriting - usually for media reuse but not fully secure; some bad sectors can be skipped
  3. Purging - more intense clearing; several iterations of clearing plus degauss; also can’t be always trusted
  4. Degaussing - only for magnetic media
  5. Destruction - most secure
  6. Cryptographic erasure - destroy encryption/decryption keys of encrypted data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Declassification

A

Purging of classified data for re-use in non-classified env

Better to destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DRM (Digital Rights Mgmt)

A

To protect copyrighted works

  • DRM license - small file with terms of use and license key
  • Persistent online authentication
  • Automatic expiration
  • Continuous audit trail - e.g. to detect concurrent use in diff locations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CASB

A
  • between users and cloud resources
  • replicate all internal security controls
  • Can detect shadow IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other Data Protection Methods

A
  1. Pseudonymization - replace personal data with pseudonyms (e.g. Patient123) before releasing data; may have less stringent GDPR requirements
  2. Tokenization - for credit card payment processing
  3. Anonymization - remove personal data or random masking (re-arrange rows within columns); GDPR may not apply if used; randomized masking is one method
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Roles

A
  1. Data owner - responsible for security of data
  2. Asset (or system) owner - responsible for security of system processing the data
  3. Business owner - responsible for the business processes that use the systems and data
  4. Data controller - collects data; determines what, why and how data should be processed
  5. Data processor - process data on behalf of data controller
  6. Data protection officer - mandated by GDPR; ensure protection of data privacy
  7. Data custodian - day-to-day tasks of protecting data
  8. Data administrator - someone who is a data custodian or with elevated privilege
  9. Users - access data
  10. Data subjects (GDPR) - person identified by data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security Baseline

A

Set of min security controls

NIST published:
- Low-impact baseline
- Moderate-impact baseline
- High-impact baseline
- Privacy-control baseline - for those orgs that process PII

Tailoring - take baseline controls and tailor to organization
Scoping - is a part of tailoring; remove controls that don’t apply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly