Section 6: Data Protection Flashcards
What is Data Protection?
The practice of safeguarding information against corruption, compromise, or loss.
What is Sensitive data?
Information that, if accessed by unauthorized individuals, could lead to security breaches or loss of competitive advantage.
What is Confidential data?
Highly sensitive data, including trade secrets, intellectual property, or source code, requiring strict access controls.
What is Public data?
Data that can be freely shared without any adverse impact if disclosed.
What is Restricted data?
Data that is only accessible to specific individuals within an organization, typically due to the sensitivity of the information.
What is Private data?
Information containing personal or internal company data, such as employee records.
What is Critical data?
Data that is essential to the operation of an organization, requiring the highest level of security.
Who are Data Owners?
Senior executives responsible for labeling information assets and ensuring appropriate protective measures are in place.
Who are Data Controllers?
Entities that determine how data is collected, stored, and used, ensuring compliance with relevant legal requirements.
Who are Data Processors?
Individuals or groups hired by data controllers to handle data collection and processing tasks.
Who are Data Custodians?
Personnel who manage the systems where data assets are stored, enforcing access controls, encryption, and backup strategies.
Who are Data Stewards?
Individuals focusing on data quality and classification, ensuring data is accurately labeled and managed according to policy guidelines.
What is Data at Rest?
Information stored in databases, file systems, or storage systems. Common protection methods include full disk encryption, file encryption, and database encryption.
What is Data in Transit?
Data that is actively moving between locations, posing a risk of interception. Protection methods include secure protocols such as SSL/TLS, Virtual Private Networks (VPNs), and IP Security (IPSec).
What is Data in Use?
Data that is actively being processed, created, or updated. Protection methods include application-level encryption, secure enclaves, and access controls.
What is Disk Encryption?
Protects data stored on hard drives by encrypting it at the disk level to prevent unauthorized access.
What is Communication Tunneling?
Secures data in transit through encrypted tunnels, such as those established by Virtual Private Networks (VPNs).
What is Hashing?
Converts data into fixed-size hash values, typically used for storing passwords securely.
What is Masking?
Replaces sensitive data with placeholders to protect privacy while retaining the original data’s utility.
What is Tokenization?
Replaces sensitive data with non-sensitive equivalents, keeping the original data stored securely elsewhere.
What is Obfuscation?
Makes data unclear or difficult to interpret by unauthorized users to protect sensitive information.
What is Segmentation?
Divides a network into segments that have unique security controls, limiting the potential impact of data breaches.
What is Permission Restriction?
Defines who can access specific data and what actions they can perform, thereby reducing internal risks.
What is Data Sovereignty?
The principle that digital information is subject to the laws of the country in which it is stored.