Data Security Flashcards

1
Q

What does data security involve?

A

Data security involves the application of various data security controls to prevent any intentional or unintentional act of data misuse, data destruction, and data modification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the states of data security?

A
  • Data at rest (offline, non-volatile medium)
  • Data in use (online, volatile medium)
  • Data in transit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of security controls applicable for data at rest

A
  • Data encryption
  • Password protection
  • Tokenization
  • Data federation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of security controls applicable for data in use

A
  • Authentication techniques
  • Tight control on this data’s accessibility
  • Full/Partial memory encryption
  • Strong identity management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of security controls applicable for data in transit

A
  • SSL and TLS
  • Email encryption tools such as PGP or S/MIME
  • Firewall controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps for information management lifecycle?

A
  • Creation
  • Organization
  • Utilization
  • Remediation
  • Storage
  • Erasure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Owners

A

Individuals or steering committees having complete control over the data in an organization; they are solely responsible for the data assets of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Controller

A

Person who collects and controls the processing of data provided to the data processor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Processor

A

Person who collects and controls the processing of data provided to the data processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Steward/Custodian

A

The data steward is accountable for business data sets, and the data custodian is accountable for technical data assets for the storage and transport of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privacy Officer

A

Senior executive who is responsible for the privacy of the organization’s data. Maintains privacy policies as well as investigate and track incidents and security loopholes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Protection Officer (DPO)

A

Ensures that sensitive information on the personnel, customers, or any other individual meets the compliance requirements of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Classification

A

Process of assigning sensitivity levels to data while the data are being generated, modified, saved, or passed over an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are data classification levels?

A

1 - Top secret
2 - Highly confidential information
3 - Proprietary information
4 - Information for internal use
5 - Public documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Do folders and files have the same NTFS permissions?

A

No, folders have additional permission “List folder contents”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Command that assigns file access on Linux

A

setfacl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Command that displays file name, owner, the group and ACL on Linux

A

getfacl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What permission mask (numeric) would you use for setting read permission on a file for all users?

A

444

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does 644 permission mask mean?

A

Only the owner can write, all can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does -rwx------ on a file mean?

A

Only the owner can read, write and execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How to lock the directory only for owners? How the permission triads would look like?

Locked - noone can read, write and execute

A

chmod 700 <dir>
drwx------ dir

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why the filesystem ACL is not enough to protect data and file encryption should be used?

A

Plugging the storage media under different device or system is enough to bypass the filesystem ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does Windows OS have a built-in tool to securely remove files?

A

Yes, it’s Cipher.
cipher /w:filename

Although running on encrypted/decrypted file will just wipe unused space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does EFS work?

A

Encrypting File System on Windows works by encrypting files and directories with a symmetric key, and this key is then encrypted with the user’s public key. Only the user who owns the corresponding private key can decrypt the symmetric key and, consequently, access the encrypted files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How the key used in EFS called? When is it generated? Where is it stored?

A

File Encryption Key (FEK) is generated for each file/folder being encrypted. It is stored in the encrypted format alongside the file/folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are different database encryption types?

A
  • Transparent/External database encryption
  • Column-level encryption
  • Symmetric database encryption
  • Asymmetric database encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does transparent/external database encryption work?

A

It uses a symmetric encryption key to encrypt the database and all backups using a database encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Is symmetric or asymmetric encryption used in bulk encryption?

A

Always symmetric encryption for large (bulk) data.

Asymmetric encryption is an order of magnitude slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How does column-level encryption work?

A

It encrypts the individual columns within the database tables using different encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How does symmetric database encryption work?

A

In is an enhanced transparent database encryption method where the database remains encrypted till it is opened and accessed

31
Q

How does asymmetric database encryption work?

A

It uses one public key to encrypt the data and one private key per authorized user to decrypt the data

32
Q

How is HTTP (SSL) connection established between server and the client?

A
  1. The browser connects to a web server by sending a message indicating that SSL is requested.
  2. Web server responds by sending a copy of its root certificate along with server’s public key.
  3. Browser verifies the certificate (is valid, is signed by CA, is not expired)
  4. Browser creates, encrypts and sends a one-time session key along with the server’s public key.
  5. Server uses its private key to decrypt the session key, sends back an ACK encrypted with the session key to begin the secure session.
  6. Secure data transmission with session key can be continued.
33
Q

SSL

A

Secure Sockets Layer - security protocol that creates an encrypted link between a web server and a web browser.

34
Q

Explain how SSL MiTM works

A

The attacker spoofs the SSL certificate of the legitimate site to establish a middleman connection from the victim to the site, gaining clear text traversal on communication between parties.

34
Q

What are the minimum requirements for the TLS encryption certificate?

A
  1. Server computer should contain an installed certificate.
  2. Certificate purpose must include Server Authentication.
  3. Certificate must be issued for FQDN of the server.
  4. Client must trust the certificate (trust the Cert Root Authority).
34
Q

S/MIME

A

Secure/Multipurpose Internet Mail Extensions. Email encryption standard. Both recipients must have a mail application that supports the S/MIME standard.

35
Q

Can you encrypt a single message?

A

Yes. In Outlook, it’s achievable from Security Settings. You have to have the recipient’s public key to encrypt the message.

36
Q

Explain how signing the data works. (public/private keys)

A

X encrypts the MD5 of data with a private key. Others can verify the integrity of the data by calculating MD5 of data and decrypting the X’s MD5 using the private key.

37
Q

Data Masking

A

Known also as data obfuscation - the process of hiding original data with random characters.

38
Q

Types of data masking

A

Static (data at rest) and dynamic (data in transit)

39
Q

Techniques of data masking

A

Character scrambling, lookup substitution, nulling out or deletion, shuffling, number/data variance (part of data changed), masking out (part of data masked)

40
Q

Deidentification

A

Process of segregating or replacing an entity’s personal identity from the data stored in a database.

41
Q

Types of deidentification

A

Masking, bucketing (replacing with common), tokenization (replace with arbitrary), hashing/salting

42
Q

What failure to notify users of their compromised data, in case of data breach, is called?

A

Violation of security norms.

43
Q

What data breach notification should include?

A

The type of data affected, the extent of breach, how many data subjects are concerned and steps to be taken to mitigate further compromise.

44
Q

What are the different levels of escalation of data breach?

A

Initial escalation (IT desk, administrators app manager), unit level (information authority, security management and coordinators), organization level (managers, like executives) and external level (ISPs, 3rd part contractors, telecom agencies, law enforcements).

45
Q

How should the organization inform the affected individuals?

A

Through social media or mainstream media. It should be disseminated in a manner to rebuild confidence in customers and convince them to avoid legal consequences.

46
Q

What are the different data sharing and privacy agreements?

A

ISA, Data Sharing and Usage Agreement, SLA and CNDA

47
Q

ISA (Interconnection Security Agreement)

A

Mutual agreement between an organization and 3rd party that decide to connect their IT systems.

48
Q

Data Sharing and Usage Agreement

A

Document agreement between data provider and receiver. Contains clear understanding of what type of data is to be shared and how the data needs to be handled.

49
Q

SLA (Service-Level Agreement)

A

Contractual agreement. States the level of service that an organization expects from a vendor. Includes metrics and detailed terms of penalties if not met.

50
Q

CNDA (Confidentiality and Non-Disclosure Agreement)

A

Security contract signed between two parties for maintaining the confidentiality of information shared between them.

51
Q

AD Rights Management Services

A

AD RMS, security solutions designed for data security through proper implementation of access policies.

52
Q

What are 8 steps of successful data backup strategy?

A
  1. Identify critical data.
  2. Select backup media.
  3. Select backup technology.
  4. Select RAID levels.
  5. Select backup method.
  6. Select backup types.
  7. Choose right backup solution.
  8. Recovery drill test.
53
Q

What are the factors to consider when choosing a backup media?

A
  • Reliability
  • Usability
  • Speed
  • Cost
  • Availability
54
Q

RAID

A

Redundant Array of Independent Disks. Method of combining multiple disks to a single unit. Offers fault tolerance.

55
Q

How many RAID levels exist?

A

0, 1, 3, 5, 1+0, 5+0

56
Q

What RAID architecture consists of?

A
  • RAID Controller
  • IDE/SATA/SCSI Interface
  • Multiport Memory Controller
  • SDRAM
57
Q

SDRAM

A

Dynamic Random Access Memory synchronized with CPU clock speed.

58
Q

Characterize RAID 0

A
  • Disk striping
  • No data redundancy
  • Splits data evenly across multiple hard drives
  • Increases performance
59
Q

Characterize RAID 1

A
  • Disk mirroring
  • Duplicates data in multiple drives
  • Provide data redundancy
60
Q

Characterize RAID 3

A
  • Disk stripping with parity
  • Data stripped at the byte level across multiple drives
  • One drive per set is taken up for parity information
  • Data recovery and error correction
61
Q

Characterize RAID 5

A
  • Block interleaved distributed parity
  • Data stripped at the byte level across multiple drives..
  • ..and parity information is distributed among all the member drives
  • minimum 3 disks
62
Q

Characterize RAID 1+0

A
  • Blocks striped and mirrored
  • combination of RAID 0 and RAID 1
  • at least 4 drives
63
Q

Characterize RAID 5+0

A
  • Mirroring and striping across multiple RAID levels
  • minimum 6 drives
  • offers better reads and writes than RAID 5 and the highest levels of redundancy and performance
64
Q

SAN

A

Storage Area Network. Specialized, dedicated and discrete high-speed network that connects storage devices with a high speed I/O interconnected (fiber channel, Ethernet)

65
Q

NAS

A

Network Attached Storage. File-based data storage and dedicated computer appliance shared over the network.

66
Q

Backup Methods

A
  • Hot
  • Cold
  • Warm
67
Q

Backup Locations

A
  • Onsite
  • Offsite
  • Cloud
68
Q

Types of backup

A
  • Full
  • Differential
  • Incremental
69
Q

What’s the difference between differential and incremental backup?

A

Differential - always in context of some specific state, regardless previous differentials (faster to restore)
Incremental - always in context of the last incremental. (faster to backup)

70
Q

Data Destruction Techniques

A
  • Clearing
  • Purging (degaussing)
  • Destroying
71
Q

Data Loss Prevention

A

DLP. Set of software products and processes that do now allow users to send confidential corporate data outside the organization.

72
Q

Types of DLP

A
  • Endpoint DLP
  • Network DLP
  • Storage DLP