Data Security & Encryption Flashcards
Data Corruption
Refers to any unintended or undesirable alteration or distortion of data, rendering it inaccurate, unreadable, incomplete, or unusable. It occurs when the actual data content no longer matches the expected or intended data structure or format
“Erasing” Data
Performing a ‘delete’ operation against a file
-Data is usually recoverable
“Clearing” Data
Preparing the media for reuse
Data cannot be recovered using traditional methods
“Purging” Data
A more intense form of “clearing” data for media reuse
Meant for less secure environments
Degaussing
Erasing data using a strong magnetic field
“Destruction” of Data
Most secure means of sanitizing media
This is the final stage in the lifecycle of data
Means more than just “deleted”
Needs to be completely unrecoverable
Record retention
Policy used for data that is a liability.
Sensitive data is destroyed after a certain amount of time (usually one year)
This applies specifically to PII
This is sometimes imposed by law
-In that case, you MUST delete it when it ages out or there will be severe fines
Tape Backup Security
Policy used for data that is critical to business/government operations
Helps prevent ransomware attacks
Data-Security Baseline Control
List of controls that an organization can apply as a baseline (the bare minimum, typically depends on the kind of data that they are responsible for)
The baseline can only be changed by:
1) Scoping
2) Tailoring
Definition of Controls in Data Security
Things you can do to prevent or mitigate a loss of data
Role of the Data Owner in Data Security
Responsible for collecting the PII.
Usually a member of senior management
Can delegate the maintenance tasks
But cannot delegate total responsibility
Role of the Data Custodian in Data Security
Responsible for the day-to-day management of the data (for the exam the keyword here is day-to-day)
Role of the Data Administrator in Data Security
In role-based access control, they are responsible for granting appropriate access to personnel.
Role of the “Data User” in Data Security
Any person who accesses the data via a computing system is a “data user”
Zero Trust Security
A framework in which no user/system (inside or outside the network) should be trusted by default. Represents a paradigm shift in cybersecurity that challenges the traditional approach of relying primarily on perimeter defenses to protect an organization’s network.
Trust is never assumed, and access to data is granted based on a strict need-to-know and “least privilege” basis
Even when you do grant access, you are watching the user’s every move and are ready to respond to anomalous behavior at all times.
Three main:
1) Secure Defaults
2) Fail Securely
3) Trust but verify
4) Principle of Least Privelige
Principle of “least privilege”
Users and systems are granted the minimum level of data access necessary to perform their specific tasks. Access rights are continuously reviewed and adjusted based on roles, responsibilities, and changes in requirements.
General Data Protection Regulation (GDPR)
Places stringent requirements on data containing PII coming in and out of the European Union(EU)
Protects individuals rights when it comes to their personal data
1) Users can request all the data an organization has collected on them
2) If a user asks an organization to delete all of the data they have collected on them, they have to do it
3) Requires Organizations to be completely transparent about their privacy policy
4) If an organization has a data breach, it must be disclosed in under 72 hours
Makes it more difficult to do business with companies overseas
Compliance is enforced by ridiculously huge fines (Up to €20 million or 4% of the annual global turnover, whichever is higher)
Two ways to reduce GDPR requirements:
1) Anonymization
2) Pseudonymization
Anonymization in Data Security
Removing any actual PII from the data. Makes it impossible to identify the data object (done properly
Can reduce the GDPR restrictions
Psudonymization in Data Security
Using aliases to represent data to reduce the exposure of PII.
Can reduce the GDPR restrictions
“Data Processor” in GDPR
Person /authority/agency that processes personal data on behalf of the “data controller” (another GDPR term)
“Data Controller” in GDPR
The person or entity that controls processing of the data
Four levels of data classification
Class 0: Public, no damage occurs if it gets out
Class 1: Some Damage would occur. This data gets the basic level of protection
Class 2: Serious Damage would Occur if it gets out
Class 3: Greatest amount of damage would occur if it gets out
Class 3 data in Data Security
Greatest amount of damage would occur if it gets out
Government Side: “Top Secret”
Civilian Side:
“Confidential/Proprietary”
Class 2 Data in Data Security
Serious Damage would Occur if it gets out
Government Side: “Secret”
Civilian Side:
“Private”