3.3-3.4 data protection strategies, resilience/recovery in sec architecture

0.0(0)
studied byStudied by 6 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

Regulated

  • Data that is managed by a third party

  • should follow government laws

2
New cards

Trade secret

An organization’s secret processes only known to the organization

3
New cards

Intellectual property

  • Data that may be publicly visible

  • Copyright and trademark restrictions

4
New cards

Data classifications from least to most restricted

Sensitive, Confidential, Private/Classified, Public/Unclassified

5
New cards

Sensitive Data

Intellectual property, PII (personal identifiable info), PHI (protected health info)

6
New cards

confidential

Very sensitive, must be approved to view

7
New cards

private/classified

restricted access, many require an NDA

8
New cards

Critical data

  • Data should always be available

  • Should create processes and procedures to maintain uptime of data

9
New cards

Data at rest

  • Data on a storage device

    Ex. Hard drive, ssd, flash drive, etc.

10
New cards

How do you encrypt data at rest

Whole disk encryption, database encryption, file encryption, etc.

11
New cards

Data in transit

Data transmitted over the network

12
New cards

How do you encrypt data in transit?

Firewall, IPS, TLS, IPsec

13
New cards

Data in use

data is actively processing in memory

14
New cards

Data Soverignty

Data is that resides in a country is subject to the rules in that country

15
New cards

Geolocation

Determining the physical location of a device, user, or object using various data sources such as GPS, Wifi signals, IP addresses, etc.

16
New cards

Geofencing

Automatically restricting or allowing access when the user is in a particular location

17
New cards

Difference between load balancing and clustering

  • In load balancing the servers are unaware of eachother compared to clustering

18
New cards

Geographic Dispersion

Backup sites should be in geographical distinct location (due to natural disasters that can affect a large area)

19
New cards

Platform Diversity

  • Using many different platforms instead of solely using one because every OS contains potential security issues

  • Spreads the risk around/limit exposure to risk

20
New cards

Multi-Cloud Systems

  • Have many cloud providers just incase if there is an outage for one, you can have similar services available in the other 

21
New cards

Continuity of Operations Planning (COOP)

  • Used when technology as a whole isn’t available and you need an alternative 

  • Ex. manual transactions, paper receipts, etc

22
New cards

Tabletop exercise

A discussion where team members talk through their actions in a simulated disaster to test and improve their emergency plans

23
New cards

Fail over

Automatically switching to a backup system when the primary one fails, ensuring continuous operations and minimal downtime

24
New cards

Parallel Processing

  • Splitting a process through multiple CPUs

  • Ex. A single computer with multiple cpu cores

25
New cards

On site backup

  • No internet link is required

  • Data is immediately available

  • less expensive than offsite

26
New cards

Off site backup

  • Need to transfer data over Internet or WAN link

  • Data is available after a disaster

  • restoration can be performed from anywhere

27
New cards

Snapshot

  • an instant backup of an entire system with the click of a button

  • saves the current configurationn and data

28
New cards

Replication

An ongoing backup (updates every few minutes) that is real time

29
New cards

Difference between generator and UPS

A generator provides long-term backup during extended power outages, a UPS is for short term