CompTIA Security + (SY0-701) > Section 7.65 Securing Data > Flashcards
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Geographic Restrictions (Geofencing)
■ Virtual boundaries to restrict data access based on location
■ Helps Compliance with data sovereignty laws
■ Prevent unauthorized access from high-risk locations
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Encryption
■ Transform plaintext into ciphertext using algorithms and keys
■ Protects data at rest and in transit
■ Requires decryption key for data recovery
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Hashing
■ Converts data into fixed-size hash values
■ Irreversible one-way function
■ Commonly used for password storage
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Masking
■ Replace some or all data with placeholders (e.g., “x”)
■ Partially retains metadata for analysis
■ Irreversible de-identification method
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Tokenization
■ Replace sensitive data with non-sensitive tokens
■ Original data stored securely in a separate database
■ Often used in payment processing for credit card protection
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Obfuscation
■ Make data unclear or unintelligible
■ Various techniques, including encryption, masking, and pseudonyms
■ Hinder unauthorized understanding
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Segmentation
■ Divide network into separate segments with unique security controls
■ Prevent lateral movement in case of a breach
■ Limits potential damage
Securing Data: methods to secure data S.T.O.P.E.M.G.H
Permission Restrictions
■ Define data access and actions through ACLs or RBAC
■ Restrict access to authorized users
■ Reduce risk of internal data breaches