Domain-2 Flashcards

1
Q

Application Encryption

A

Encryption engine is in the application using the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Transparent Encryption

A

Encryption engine is within the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

common challenge w/key management

A
  1. Access to the key
  2. Key storage
  3. Backup & replication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key escrow & management considerations

A

take into account of all relevant laws, regulations, & jurisdiction requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When possible key management should be conducted separately from CSP, why?

A

to enforce SOD & force collusion if unauthorized data access is attempted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tokenization

A

The process of replacing sensitive data element with nonsensitive equivalent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Anonymization

A

The process of removing the direct identifiers in order to prevent data analysis tools from collating or pulling data from multiple sources to identify an individual or sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Masking/Obfuscation

A

The process of hiding, omitting or replacing sensitive data from a data set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit splitting

A

Splitting up & storing encrypted information across different cloud storage services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Classification

A

The process of determining the impact of the loss of CIA of the information/asset to an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Labeling

A

referred to as tagging the data with additional information (department, location, and creator). One of the labeling options can be classification according to a certain criteria such as top secret, secret, or classified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Classified data (Government/Military)

A
  1. Top secret
  2. Secret
  3. Confidential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controller

A

determines the purposes & means of the processing of personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Processor

A

processes personal data on behalf of the controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IRM protects files from

A

unauthorized copying, viewing, printing, forwarding, deleting, and editing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DRM vs IRM

A

DRM - songs and movies

IRM - documents, spreadsheets, & presentations

17
Q

DRM primary goal

A

to protect intellectual property from being copied and distributed without properly compensating the owners of the property

18
Q

The Digital Millennium Copyright Act, amended to the US copyright law,

A

criminalized the use of techniques intended to circumvent DRM technology

19
Q

Enterprise DRM

A

aka - IRM; Focused at protecting enterprise assets such as documents and e-mails through implementation of usage rights policies

20
Q

the objective of data retention policy

A
  1. to keep important information for future use or reference
  2. to organize information so it can be searched and accessed at a later date
  3. to dispose of information that is no longer needed
21
Q

Data retention policy should define:

A

Retention periods
Data formats
Data security
Data retrieval procedures

22
Q

Data retention policy should have:

A
  • Regulatory/Statutory compliance objective(s) - what are we liable/accountable for?
  • Data mapping - what types of data do we have?
  • Data classification - where is the data and what is it worth?
  • Retention period - How long do we need to keep data?
  • Monitoring - How effective/efficient are we?
23
Q

overwriting

A

writing random data over the actual data

24
Q

Encryption

A

using an encryption method to re-write the data in an encrypted format to make it unreadable w/o encryption key

25
Q

Data archiving

A

moving data from production systems to long term storage systems

26
Q

Data archiving policy

A
  • Data encryption procedures
  • Data monitoring procedures
  • Abilities for eDiscovery
  • BCDR options
  • Allowed data format and media types
  • Data restoration procedures
  • Legal Hold capabilities
27
Q

Legal hold

A

aka-litigation hold, a notification sent from an organization’s legal team to employees instructing them not to delete electronically stored information (ESI). OR discard paper documents that may be relevant to a new or imminent legal case

28
Q

Spoilation

A

deletion or modification of potentially relevant evidence

29
Q

Relevant cloud SLA contract (IaaS)

A
  1. Cloud or network perimeter network logs
  2. Logs from DNS Servers
  3. VM monitor (VMM) logs
  4. Host OS & Hypervisor logs
  5. API access logs
  6. Management portal logs
  7. Packet captures
  8. Bill records
30
Q

Self-authenticating

A

evidence pertains to any item a party can submit without offering additional proof showing its authenticity