Lesson 16: Summarize Data Protection and Compliance Concepts Flashcards

1
Q

Define ‘regulated data’

A

Information subject to legal or regulatory requirements regarding their handling, storage, and protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common forms of regulated data?

A

Financial information, healthcare records, social security numbers, credit card details, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a ‘trade secret’

A

Intellectual property that gives a company a competitive advantage but hasn’t been registered with a copyright, trademark, or patent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do organizations implement to safeguard trade secrets?

A

NDA’s to bind confidentiality of trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define ‘non-human-readable data’

A

Binary code, encrypted data, or data represented in a complex structure or encoding that requires specialized software or algorithms to decipher and interpret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What mechanisms are typically implemented to secure human readable data?

A

Security monitoring, user awareness, DLP, content filtering, and web security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What mechanisms are typically implemented to secure non-human readable data?

A

Encryption, access controls, intrusion detection and prevention, secure data exchange, and code/application security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define ‘data classification’

A

A decision tree for applying one or more tags or labels to each data asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define the ‘public/unclassified’ data classification

A

No restrictions on viewing the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define ‘Data sovereignty’

A

The principle that countries and states may impose individual requirements on data collected or stored within their jurisdiction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define ‘privacy data’

A

Personally identifiable or sensitive information associated with an individual’s personal, financial, or social identity, that if exposed or mishandled, could infringe upon an individual’s privacy rights.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of privacy data?

A

Privacy data focuses on protecting personal information to preserve an individual’s privacy rights, prevent identity theft, and maintain the confidentiality of personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define a ‘data controller’ in regards to General Data Protection Regulation (GDPR)

A

The entity or organization that determines the purposes and means of processing personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the responsibility of a data controller?

A

Handling compliance, obtaining appropriate consent from data subjects, providing privacy notices, implementing data protection policies and procedures, and handling data subject requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define a ‘data processor’ in regards to General Data Protection Regulation (GDPR)

A

Acts under the authority and instructions of the Data Controller to processes personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the responsibility of a data processor?

A

To process personal data only for the purposes defined by the Data Controller; Implement required security measures, maintain CIA of the data, and cooperate with the Data Controller to meet their legal obligations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are examples of data processors?

A

A cloud service provider or a payroll processing company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define a ‘data inventory’

A

List of classified data/information stored or processed by a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of a data inventory?

A

So organizations can ensure that their processing activities align with the specified lawful purposes outlined in privacy laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define ‘data retention’

A

The process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does keep a data inventory help data retention?

A

Data inventories help organizations determine appropriate retention periods for different categories of personal data, ensuring compliance.

22
Q

Define a ‘data breach’

A

When confidential or private data is read, modified, or deleted without authorization.

23
Q

Define a ‘privacy breach’

A

Refers specifically to loss or disclosure of personal and sensitive data.

24
Q

What are some of the outcomes a data/privacy breach can have?

A

Reputational damage; Identity theft; fines; Intellectual property theft.

25
Q

What are the 3 states data can be classified in?

A
  1. Data at rest
  2. Data in transit/motion
  3. Data in use/processing
26
Q

Define ‘data at rest’

A

The data is in some sort of persistent storage media.

27
Q

How is data at rest typically secured?

A

By implementing some form of encryption (FDE, database encryption, file/folder) or access control.

28
Q

Define ‘data in transit/motion’

A

When data is transmitted over a network.

29
Q

How is data in transit/motion secured?

A

By implementing a transport encryption protocol, such as TLS or IPSec.

30
Q

Define ‘data in use’

A

When data is present in volatile memory, such as system RAM or CPU registers and cache.

31
Q

How can data in use be secure?

A

Although most data needs to be decrypted from rest in order to be used, trusted execution environment (TEE) mechanisms are able to encrypt data as it exists in memory.

32
Q

What is the function of data loss prevention (DLP) software?

A

To automate the discovery and classification of data types and enforce rules so that data is not viewed or transferred without a proper authorization.

33
Q

What are the 3 typical components of Data loss prevention (DLP) products?

A
  1. Policy Server
  2. Endpoint agents
  3. Network agents
34
Q

What is the purpose of a Data loss prevention (DLP) policy server?

A

To configure classification, confidentiality, and privacy rules and policies, log incidents, and compile reports.

35
Q

What is the purpose of a Data loss prevention (DLP) endpoint agent?

A

To enforce policy on client computers, even when they are not connected to the network.

36
Q

What is the purpose of a Data loss prevention (DLP) network agent?

A

To scan communications at network borders and interface with web and messaging servers to enforce policy.

37
Q

This method of data protection is often associated with payment processing systems.

A

Tokenization; Replaces sensitive data (such as a credit card number) with a randomly generated token while securely storing the original data in a separate location.

38
Q

Define a ‘tombstone’ mechanism

A

a Data loss prevention (DLP) mechanism where original file is quarantined and replaced with one describing the policy violation and how the user can release it again.

39
Q

Define a ‘code of conduct’

A

Rules of behavior and ethical standards; Sets out expected professional standards.

40
Q

Define a ‘clean desk policy’

A

Organizational policy that mandates employee work areas be free from potentially sensitive information.

41
Q

When educating end users, what should be of focus?

A

Responsibilities and threats that are relevant to users in a language they can understand.

42
Q

What are methods of employee education?

A

Facilitated workshops and events, one-on-one instruction and mentoring, plus resources such as computer-based or online training, videos, books, and blogs/newsletters.

43
Q

Define ‘Computer-based training (CBT)’

A

Training and education programs delivered using computer devices and e-learning instructional models and design.

44
Q

What are forms of Computer-based training (CBT)?

A

Simulations; branching scenarios.

45
Q

What is a branching scenario?

A

Having students choose between options to find the best choices to solve a cybersecurity incident or configuration problem.

46
Q

Define ‘Anomalous behavior recognition’

A

Actions or patterns that deviate significantly from expectations; Systems that automatically detect users, hosts, and services that deviate from what is expected.

47
Q

How can end users support anomalous behavior recognition?

A

By training employees to recognize and report anomalous behavior.

48
Q

What are examples of anomalous behavior?

A

Unusual network traffic, user account activity anomalies, insider threat actions, abnormal system events, and fraudulent transactions.

49
Q

What mechanisms are used to automatically detect anomalous behavior?

A

Network intrusion detection, user behavior analytics, system log analysis, and fraud detection.

50
Q

In order, what are the 7 stages of the security awareness training lifecycle?

A
  1. Assessment
  2. Planning and design
  3. Development
  4. Delivery and implementation
  5. Evaluation and feedback
  6. Ongoing reinforcement
  7. Monitoring and adaptation