Data Protection Flashcards

(24 cards)

1
Q

What is Data Protection?

A

Safeguarding information from corruption, compromise, or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the types of Data Classifications.

A
  • Sensitive
  • Confidential
  • Public
  • Restricted
  • Private
  • Critical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are the Data Owners?

A

Individuals responsible for maintaining confidentiality, integrity, availability, and privacy of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the states of Data?

A
  • Data at rest
  • Data in transit
  • Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Data Sovereignty?

A

Information subject to laws and governance structures within the nation it is collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two methods of securing data.

A
  • Geographic Restrictions
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data Loss Prevention (DLP)?

A

Strategy to prevent sensitive information from leaving an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the importance of Data Classification?

A
  • Helps allocate appropriate protection resources
  • Prevents over-classification to avoid excessive costs
  • Requires proper policies to identify and classify data accurately
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Sensitive Data.

A

Information that, if accessed by unauthorized persons, can result in the loss of security or competitive advantage for a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the Government Classification Levels?

A
  • Unclassified
  • Sensitive but Unclassified
  • Confidential
  • Secret
  • Top Secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of a Data Steward?

A

Focuses on data quality and metadata, ensuring data is appropriately labeled and classified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Data at rest refers to data that is ______.

A

stored in databases, file systems, or storage systems, not actively moving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What encryption methods are used for Data at Rest?

A
  • Full Disk Encryption (FDE)
  • Partition Encryption
  • File Encryption
  • Volume Encryption
  • Database Encryption
  • Record Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Transport Encryption Methods for Data in Transit?

A
  • SSL (Secure Sockets Layer)
  • TLS (Transport Layer Security)
  • VPN (Virtual Private Network)
  • IPSec (Internet Protocol Security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by Data in Use?

A

Data actively being created, retrieved, updated, or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Regulated Data.

A

Controlled by laws, regulations, or industry standards.

17
Q

What is Personal Identification Information (PII)?

A

Information used to identify an individual, such as names and social security numbers.

18
Q

What is the purpose of Tokenization?

A

Replace sensitive data with non-sensitive tokens, while storing original data securely.

19
Q

True or False: Data Sovereignty laws require data storage and processing within national borders.

20
Q

What are the types of Data Loss Prevention (DLP) Systems?

A
  • Endpoint DLP System
  • Network DLP System
  • Storage DLP System
  • Cloud-Based DLP System
21
Q

What is the role of a Privacy Officer?

A

Oversees privacy-related data, ensuring compliance with legal and regulatory frameworks.

22
Q

What does Encryption do?

A

Transforms plaintext into ciphertext using algorithms and keys.

23
Q

What is Masking in data security?

A

Replace some or all data with placeholders, partially retaining metadata for analysis.

24
Q

What does Segmentation accomplish in network security?

A

Divides network into separate segments with unique security controls to prevent lateral movement.