SY0-701: 3.0 (Security Architecture) Flashcards
Data Classifications (Companies) (3.3)
Sensitive
Confidential
Public
Restricted
Private
Critical
Sensitive Data (3.3)
Has minimal impact if released (e.g. organizations financial data)
Confidential Data (3.3)
Contains items such as trade secrets, intellectual property data, and source code that affect the business if disclosed (only viewed by approved personnel)
Public Data (3.3)
Has no impact on the company if released and is often posted in an open-source environment
Restricted Data (3.3)
Proprietary data including trade secrets
Private Data (3.3)
Contains data that should only be used within the organization (e.g. personnel records, salaries. etc.)
Critical Data (3.3)
Contains valuable data (e.g. credit card #’s
Data Classifications (Government) (3.3)
Unclassified
Sensitive but Unclassified
Confidential
Secret
Top Secret
Unclassified data (3.3)
Data that can be released to the public or under the Freedom of Information Act
Sensitive but Unclassified (3.3)
Data that would not hurt national security if released but could impact those whose data was being used (e.g. medical records)
Confidential Data (3.3)
Data that could seriously affect the government if unauthorized disclosures happen
Secret Data (3.3)
Data that could seriously damage national security if disclosed
Top Secret (3.3)
Data that would gravely damage national security if disclosed
Data at Rest (3.3)
Refers to any data stored in databases, file systems, or other storage systems (prime target for threat actors)
Methods to secure data at rest (3.3)
Full disk encryption- Encrypts entire hard drive
Partition encryption- Encrypts specific partition of drive
File encryption- Encrypts individual files
Volume encryption- Encrypts a set of selected files/directories
Database encryption- Encrypts data stored in database (table, row, column)
Record encryption- Encrypts specific record in database
Data in Transit/Data in Motion (3.3)
Data that is actively moving from one location to another, such as across the Internet or through a private network
Methods to secure data in transit/motion (3.3)
SSL (Secure Socket Layer) and TLS (Transport Layer Security)
VPNs (Virtual Private Networks)
IPSec (Internet Protocal Security)
SSL/TLS (3.3)
Secure Socket Layer/Transport Layer Security
Cryptographic protocols designed to provide secure communication over a computer network
VPN (3.3)
Virtual Private Network
Technology that creates a secure connection over a less secure network (e.g. over the Internet)
IPSec (3.3)
Internet Protocal Security
Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream
Data in Use (3.3)
Data that is in the process of being created, retrieved, updated, or deleted
Methods of securing data in use (3.3)
Encryption at application level
Access controls
Secure Enclave (dedicated secure subsystem integrated into Apple System on Chip- SoC)
Intel software guard (encrypts data in memory)
Data Types (3.3)
Regulated Data
Trade Secrets
Intellectual Property
Legal Information
Financial Information
Human Readable vs Non-Human Readable Data
Regulated Data (3.3)
Information controlled by laws, regulations, or industry standards (e.g. GDPR- General Data Protection Regulation, HIPAA- Health Insurance Portability and Accountability Act)