Section 6: Data Protection Flashcards

1
Q

What is Data Protection?

A

The practice of safeguarding information against corruption, compromise, or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Sensitive data?

A

Information that, if accessed by unauthorized individuals, could lead to security breaches or loss of competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Confidential data?

A

Highly sensitive data, including trade secrets, intellectual property, or source code, requiring strict access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Public data?

A

Data that can be freely shared without any adverse impact if disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Restricted data?

A

Data that is only accessible to specific individuals within an organization, typically due to the sensitivity of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Private data?

A

Information containing personal or internal company data, such as employee records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Critical data?

A

Data that is essential to the operation of an organization, requiring the highest level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who are Data Owners?

A

Senior executives responsible for labeling information assets and ensuring appropriate protective measures are in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who are Data Controllers?

A

Entities that determine how data is collected, stored, and used, ensuring compliance with relevant legal requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who are Data Processors?

A

Individuals or groups hired by data controllers to handle data collection and processing tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who are Data Custodians?

A

Personnel who manage the systems where data assets are stored, enforcing access controls, encryption, and backup strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who are Data Stewards?

A

Individuals focusing on data quality and classification, ensuring data is accurately labeled and managed according to policy guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Data at Rest?

A

Information stored in databases, file systems, or storage systems. Common protection methods include full disk encryption, file encryption, and database encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Data in Transit?

A

Data that is actively moving between locations, posing a risk of interception. Protection methods include secure protocols such as SSL/TLS, Virtual Private Networks (VPNs), and IP Security (IPSec).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Data in Use?

A

Data that is actively being processed, created, or updated. Protection methods include application-level encryption, secure enclaves, and access controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Disk Encryption?

A

Protects data stored on hard drives by encrypting it at the disk level to prevent unauthorized access.

17
Q

What is Communication Tunneling?

A

Secures data in transit through encrypted tunnels, such as those established by Virtual Private Networks (VPNs).

18
Q

What is Hashing?

A

Converts data into fixed-size hash values, typically used for storing passwords securely.

19
Q

What is Masking?

A

Replaces sensitive data with placeholders to protect privacy while retaining the original data’s utility.

20
Q

What is Tokenization?

A

Replaces sensitive data with non-sensitive equivalents, keeping the original data stored securely elsewhere.

21
Q

What is Obfuscation?

A

Makes data unclear or difficult to interpret by unauthorized users to protect sensitive information.

22
Q

What is Segmentation?

A

Divides a network into segments that have unique security controls, limiting the potential impact of data breaches.

23
Q

What is Permission Restriction?

A

Defines who can access specific data and what actions they can perform, thereby reducing internal risks.

24
Q

What is Data Sovereignty?

A

The principle that digital information is subject to the laws of the country in which it is stored.

25
What are Geographic Restrictions?
Virtual boundaries that restrict data access based on location to comply with data sovereignty laws.
26
What is Encryption?
Converts data into ciphertext to protect it from unauthorized access both at rest and in transit.
27
What is the DLP Strategy?
A comprehensive approach that monitors and controls data to prevent unauthorized access or exfiltration, applicable to data in use, in transit, and at rest.
28
What is Endpoint DLP?
Monitors data on individual devices (such as laptops or desktops) to prevent unauthorized file transfers.
29
What is Network DLP?
Monitors data traffic at the network perimeter to detect and prevent unauthorized data from leaving the organization.
30
What is Storage DLP?
Inspects and monitors data that is stored at rest within servers or data centers.
31
What is Cloud-Based DLP?
Protects data stored in cloud environments through Software as a Service (SaaS) solutions.