Data Protection Flashcards

(48 cards)

1
Q

Data protection

A

Safeguarding information from corruption, compromise, or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Classification

A

Based on the value to organization and the sensitivity of the information, determined by the data owner

  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sensitive data

A

Information that, if accessed by unauthorized persons, can result in the loss of security or competitive advantage for a company

  • over classifying data leads to protecting data at a high level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Importance of data classification

A
  • Helps allocate appropriate protection resources
  • Prevents over-classification to avoid excessive costs
  • Requires proper policies to identify and classify data accurately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Commercial Business Classification Levels

A

Public - No impact if released; often publicly accessible data

Sensitive - Minimal impact if released (ex: financial data)

Private - Contains internal personnel or salary information

Confidential - Holds trade secrets, intellectual property, source code, etc

Critical - Extremely valuable and restricted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Government Classification Levels

A

Unclassified - Generally releasable to the public; can be released under the Freedom of Information Act

Sensitive, but unclassified - Includes medical records, personnel files, etc. ; no harm to national security

Confidential - Contains information that could affect the government (ex: trade secrets)

Secret - Holds data like military deployment plans, defensive postures

Top Secret - Highest level, highly sensitive national security information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Ownership

A

Process of identifying the individual responsible for maintaining the confidentiality, integrality, availability, and privacy of information assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Owner

A

a senior executive responsible for labeling information and ensuring they are protected with appropriate controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Controller

A

Entity responsible for determining data storage, collection, and usage purposes and methods, as well as ensuring the legality of these processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data processor

A

a group or individual hired by the data controller to assist with tasks like data collection and processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Steward

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and classified, often working under the data owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Custodian

A

Responsible for managing the systems on which data assets are stored, including enforcing access controls, encryption, and backup measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Officer

A

Oversees privacy-related data, such as PII, SPI, and PHI ensuring compliance with legal and regulatory frameworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Ownership Responsibility

A

The IT Department (CIO or IT personnel) should NOT be the data owner; data owners should be individuals from the business side who understand the data’s content and can make informed decisions about classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Selection of Data Owners

A

Should be designated within their respective departments based on their knowledge of the data and its significance within the organization

  • example: CFO controls financial data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data at Rest

A

Data stored in databases, file systems, or storage systems, not actively moving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption Methods

A
  • Full Disk Encryption (FDE) = Encrypts the entire hard drive
  • ** Partition Encryption** = Encrypts specific partitions, leaving others unencrypted
  • Volume Encryption = Encrypts selected files or directories
  • Database Encryption = Encrypts data stored in a database at column, row, or table levels
  • Record Encryption = Encrypts specific fields within a database record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data in Transit

A

Data actively moving from one location to another, vulnerable to interception

Can be protected with transport encryption methods:
- SSL
- VPN
- IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Secure Sockets Layer (SSL)

A

Secure communication over networks, widely used in web browsing and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Virtual Private Network (VPN)

A

Creates secure connections over less secure networks like the internet

21
Q

Internet Protocol Security (IPSec)

A

Secures IP communications by authenticating and encrypting IP packets

22
Q

Data in Use

A

Data actively being created, retrieved, updated, or deleted

Protection measures:
- Encryption at the application level = encrypts data during procession

  • Access controls = Restricts access to data during processing
  • Secure Enclaves = Isolated environments for processing sensitive data
  • Mechanisms like INTRL Software Guard; encrypts data in memory to prevent unauthorized access
23
Q

Regulated data

A

Controlled by laws, regulations, or industry standards

Compliance requirements:
- General Data Protection Regulation (GDPR)
- Health Insurance Portability and Accountability Act (HIPPA)

24
Q

Personal Identification Information (PII)

A

Information used to identify and individual
- names
- social security number
- addresses

25
Protected Health Information (PHI)
Information about health status, healthcare provision, or payment linked to a specific individual - Protected under HIPAA
26
Trade Secrets
Confidential business information giving a competitive edge - legally protected, unauthorized disclosure results in penalties example: - manufacturing processes - marketing strategies - Proprietary software
27
Intellectual Property (IP)
Creations of the mind (inventions, literary works, designs) - protected by patents , copyrights, trademarks to encourage innovation - unauthorized use can lead to legal action
28
Legal Information
Data related to legal proceedings, contracts, regulatory compliance - requires high-level protection for client confidentiality and legal privilege
29
Financial Information
Data related to financial transactions like sales records, tax documents, bank statements - Targeted by cyber criminals for fraud and identity theft - subject to PCI DSS (Payment Card Industry Data Security Standard)
30
Human-Readable Data
Understandable directly by humans (text documents, spreadsheets)
31
Non-Human-Readable Data
Requires machine or software to interpret - Binary code - machine language Contains sensitive information and requires protection
32
Data Sovereignty
Digital information subject to laws of the country where its located - Gained importance with cloud computing's global data storage
33
General Data Protection Regulation (GDPR)
Protects EU citizens' data within EU and EEA borders - compliance required regardless of data location - non-compliance leads to significant fines
34
Data Sovereignty Laws (ex: Chine/Russia)
Require data storage and processing within national borders - challenge for multinational companies and cloud services - pose complex challenges
35
Access Restrictions
Cloud services may restrict access from multiple geographic locations
36
Geographic Restrictions (Geofencing)
Virtual boundaries to restrict data access based on location - compliance with data sovereignty laws - prevent unauthorized access from high risk locations
37
Encryption
Transform plaintext into cipher text using algorithms and keys - protects data at rest and in transit - requires decryption key for data recovery
38
Hashing
Converts data into fixed-size hash values - Irreversible one-way function - commonly used for password storage
39
Masking
Replace some or all data with placeholders (ex: "x") - partially retains metadata for analysis - irreversible de-identification method
40
Tokenization
Replacing sensitive data with non-sensitive tokens - original data stored securely in a separate database - often used in patient processing for credit card protection
41
Obfuscation
Make data unclear or unintelligible - Various techniques, including encryption, masking, and pseudonyms - hinder unauthorized understanding
42
Segmentation
Divide network into separate segments with unique security controls - prevent lateral movement in case of a breach - limits potential damage
43
Permission Restrictions
Define data access and actions through ACLs (Access Control Lists) and RBACs (Role-Based Access Controls)
44
Data Loss Prevention (DLP)
Aims to monitor data in use, in transit, or at rest to detect and prevent data theft - DLP systems are available as software or hardware solutions
45
Endpoint DLP System
Installed as software on workstations or laptops - Monitors data in use on individual computers - Can prevent or alert on file transfers based on predefined rules
46
Network DLP System
Software or hardware placed at the network perimeter - Focuses on monitoring data entering and leaving the network - Detects unauthorized data leaving the network
47
Storage DLP System
Installed on a server in the data center - inspects data at rest, especially encrypted or watermarked data - monitors data access patterns and flags policy violations
48
Cloud-Based DLP System
Offered as a software-as-a-service solution - protects data stored in cloud services