Data Protection Flashcards

(38 cards)

1
Q

Data classification

A

Based on the value to the organization and the sensitivity of the information,
determined by the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Commercial Business Classification Levels

A
  1. Public
  2. Sensitive
  3. Private
  4. Confidential
  5. Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Government Classification Levels

A
  1. Unclassified
  2. Sensitive but Unclassified
  3. Confidential
  4. Secret
  5. Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Owner

A

A senior executive responsible for labeling information assets and ensuring they
are protected with appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Processor

A

A group or individual hired by the data controller to assist with tasks like data
collection and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Controller

A

Entity responsible for determining data storage, collection, and usage purposes
and methods, as well as ensuring the legality of these processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Steward

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and
classified, often working under the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Custodian

A

Responsible for managing the systems on which data assets are stored, including
enforcing access controls, encryption, and backup measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Privacy Officer

A

Oversees privacy-related data, such as personally identifiable information (PII),
sensitive personal information (SPI), or protected health information (PHI),
ensuring compliance with legal and regulatory frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SPI

A

Sensitive Personal Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PHI

A

Personal Health Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Ownership Responsibility

A

The IT department (CIO or IT personnel) should not be the data owner; data
owners should be individuals from the business side who understand the data’s
content and can make informed decisions about classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data at Rest

A

Data stored in databases, file systems, or storage systems, not actively moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption Methods for data at rest

A
  1. Full Disk Encryption (FDE)
  2. Partition Encryption
  3. File Encryption
  4. Volume Encryption
  5. Database Encryption
  6. Record Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data in Transit

A

Data actively moving from one location to another, vulnerable to interception

17
Q

Transport Encryption Methods

A
  1. SSL and TLS
  2. VPN
  3. IPSec
18
Q

SSL

A

Secure Sockets Layer

Secure communication over network, widely used in web browsing and email

19
Q

TLS

A

Transport Layer Security

Supersedes SSL

20
Q

VPN

A

Virtual Private Network

Creates secure connections (tunnels) over less secure networks like the internet

21
Q

IPSec

A

Internet Protocol Security

Secures IP communications by authenticating and encrypting IP packets

22
Q

Data in Use

A

Data actively being created, retrieved, updated, or deleted

23
Q

Data in Use protection methods

A
  1. Encryption at application level
  2. Access Controls
  3. Secure Enclaves
  4. Memory Encryption
24
Q

Secure Enclave

A

Isolated environment for processing sensitive data

25
Regulated data
Data that is controlled by laws, regulations, or industry standards. Subject to compliance requirements (GDPR, HIPAA etc.)
26
GDPR
General Data Protection Regulation - Protects EU citizens' data within EU and EEA borders - Compliance required regardless of data location - Non-compliance leads to significant fines
27
HIPAA
Health Insurance Portability and Accountability Act
28
PCI DSS
Payment Card Industry Data Security Standard
29
Data Sovereignty
Digital information subject to laws of the country where it's located Gained importance with cloud computing's global data storage
30
Geographic Restrictions
aka Geofencing - Virtual boundaries to restrict data access based on location - Compliance with data sovereignty laws - Prevent unauthorized access from high-risk locations
31
Encryption
- Transform plaintext into ciphertext using algorithms and keys - Protects data at rest and in transit - Requires decryption key for data recovery
32
Hashing
- Converts data into fixed-size hash values - Irreversible one-way function - Commonly used for password storage
33
Masking
- Replace some or all data with placeholders (e.g., "x") - Partially retains metadata for analysis - Irreversible de-identification method
34
Tokenization
- Replace sensitive data with non-sensitive tokens - Original data stored securely in a separate database - Often used in payment processing for credit card protection
35
Obfuscation
- Make data unclear or unintelligible - Various techniques, including encryption, masking, and pseudonyms - Hinder unauthorized understanding
36
Segmentation
- Divide network into separate segments with unique security controls - Prevent lateral movement in case of a breach - Limits potential damage
37
Permission Restrictions
- Define data access and actions through ACLs or RBAC - Restrict access to authorized users - Reduce risk of internal data breaches
38
DLP
Data Loss Prevention