Data Protection Flashcards

(58 cards)

1
Q

Information is subject to the laws & governance structures within their nation where it is collected. Refers to the concept that digital information is subject to the laws of the country in which it is located.

A

Data Sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Strategy for ensuring sensitive or critical information does not leave an organization. Set up to monitor the data of a system while it’s in use, in transit, or at rest in order to detect any attempts to steal the data.

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Category based on the organization’s value & the sensitivity of the information if it were to be disclosed.

A

Data Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any information that can result in a loss of security or a loss of advantage to a company if accessed by an unauthorized person.

A

Sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Has no impact on the company if released & is often posted in an open -source environment.

A

Public Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Has minimal impact if released (organization’s financial data).

A

Sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contains data that should only be used within the organization.

A

Private Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contains items such as trade secrets, intellectual property data, & source code that affect the business if disclosed.

A

Confidential Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Contains valuable information.

A

Critical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data that can be released to the public or under the Freedom of Information Act.

A

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data that would not hurt national security if released but could impact those whose data was being used.

A

Sensitive but Unclassified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data that could seriously affect the government if unauthorized disclosures happen.

A

Confidential (Government)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data that could seriously damage national security if it is disclosed.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data that would damage national security if it is disclosed.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process of identifying the person responsible for the confidentiality, integrity, availability, & privacy of the information assets.

A

Data Ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Senior executive role that has the responsibility for maintaining the confidentiality, integrity, and availability of the information assets.

A

Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Entity that holds responsibility for deciding the purposes & methods of data storage, collection, and usage, and for guaranteeing the legality of processes.

A

Data Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Group or individual hired by the data Controller to help with tasks like collecting, storing, or analyzing data.

A

Data Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Focused on the quality of the data & the associated metadata.

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Responsible for handling the management of the system on which the data assets are stored.

A

Data Custodian (System Administrator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Role that is responsible for the oversight of any kind of privacy-related data, like PII, SPI, or PHI.

A

Privacy Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Should be a business entity responsible for creating this information; know more about the data based on the content of the company, with each owner being assigned to their own department.

A

Who should be the data owner?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These people should never be the data owner.

A

I.T. People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Refers to any data stored in databases, file systems, or other storage systems.

25
Encrypts the entire hard drive.
Full Disk Encryption
26
Encrypts specific partitions of a hard drive, leaving other partitions unencrypted.
Partition Encryption
27
Encrypts individual files.
File Encryption
28
Encrypts a selected set of files or Directories.
Volume Encryption
29
Encrypts data stored in a database.
Database Encryption
30
Encrypts specific fields within a database record.
Record Encryption
31
Refers to data actively moving from one location to another, such as across the Internet or through a private network.
Data in Transit/Data in Motion
32
Cryptographic Protocols designed to provide secure communication over a computer network.
Secure Sockets Layer (SSL) Transport Layer Security (TLS)
33
Technology that creates a secure connection over a less secure network (Internet).
Virtual Private Network (VPN)
34
Protocol suite used to secure IP Communications by authenticating & encrypting each IP packet in a data stream.
Internet Protocol Security (IPSec)
35
Refers to data in the process of being created, retrieved, updated, or deleted.
Data in Use
36
Information controlled by laws, regulations, or industry standards.
Regulated Data
37
Any information that can be used to identify an individual.
Personal Identification Information (PII)
38
Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual.
Protected Health Information (PHI)
39
Type of confidential business information that provides a company with a competitive edge.
Trade Secrets
40
Creations of the mind, such as inventions, literary & artistic works, designs, & symbols.
Intellectual Property (IP)
41
Includes any data related to legal proceedings, contracts, or regulatory compliance.
Legal Information
42
Includes data related to an organization's financial transactions, such as sales records, invoices, tax documents, and bank statements.
Financial Information
43
Information that can be understood by humans without the need for a machine or software.
Human-readable Data
44
Information that requires a machine or software to interpret.
Non-human Readable Data
45
Has stringent rules for data protection & grants individuals strong rights over their personal data (European Union).
General Data Protection Regulation (GDPR)
46
Involves setting up virtual b boundaries to restrict data access based on geographic location.
Geographic Restrictions (Geo-fencing)
47
Fundamental data security method that transforms readable data (plaintext) into unreadable data (ciphertext) using an algorithm and an encryption key.
Encryption
48
Technique that converts data into a fixed size of numerical or alphanumeric characters, known as a hash value.
Hashing
49
Involves replacing some or all of the data in a field with a placeholder, such as "x", to conceal the original content.
Masking
50
Replaces sensitive data with non-sensitive substitutes, known as tokens.
Tokenization
51
Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand.
Obfuscation
52
Involves dividing a network into separate segments, each with its own security controls.
Segmentation
53
Involves defining who has access to specific data & what they can do with it.
Permission Restrictions
54
A piece of software that's installed on a workstation or a laptop, & it's going to monitor the data that's in use on that computer.
Endpoint DLP System
55
A piece of software or hardware that's a solution placed at the perimeter of the network to detect data in transit.
Network DLP System
56
A software that is installed on a server in the data center & inspects the data while it's at rest on the server.
Storage DLP
57
Usually offered as software-as-a service, and it's part of the cloud service & storage needs.
Cloud-based DLP System
58