Strategies to protect data.

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:53 PM on 4/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

17 Terms

1
New cards

Includes data that is subject to regulatory requirements, such as personal data protected under laws like GDPR, health information covered by HIPAA, or financial data under PCI-DSS. Compliance with legal and regulatory standards it's crucial.

Regulated Data

2
New cards

Refers to the creations of the mind like inventions, artistic works, designs, etc. IP theft can result in significant economic loss and competitive disadvantage.

Intellectual Property

3
New cards

Law grants protections against unauthorized duplications of an original creative work. Protect creative expression of ideas or resources. Protection varies within 70 years, 95 years, and 120 years.

Intellectual Property - Copyrights

4
New cards

Protects brand identity like names, logos, and slogans that identify a company or product. Example: Nike “swoosh” logo and Apple name and logo

Intellectual Property - Trademarks

5
New cards

Protects the rights of inventors and their inventions. Basically protects an invention and how it functions. Owner has exclusive control of the invention for 20 years.

Intellectual Property - Patent

6
New cards

Any form of information, device, method, process, or formula that, if disclosed, will cause significant damage to an organization. Nondisclosure agreements (NDA) should be used to protect the information. Think krabby patty formula.

Intellectual Property - Trade Secrets

7
New cards

Encompasses information pertaining to legal matters, including case files, legal advice, and other sensitive legal documents. Breaches can compromise attorney – client privilege and case integrity.

Legal Information

8
New cards

Includes details about transactions, financial records, credit info, and other monetary data. It is the prime target for cyber crimes like fraud and identity theft. To protect this info, you should use encryption, secure, transaction, processing, and follow industry standards.

Financial Information

9
New cards

Data that is easily interpreted by humans, such as tax documents, images, and printed information.

Readable Data

10
New cards

Require a specific tools or software to interpret, like encrypted data, machine code, or log files.

Non-Human Readable Data

11
New cards

Both human readable data and non-human readable data require protection. Human readable data is susceptible to direct reading, while non-human readable data can be a target for cyber attack, aimed at description or misuse.

True

12
New cards

Help in determining the level of security controls and handling protocols that should be applied to various types of data including creation, usage, destruction. Remember the data owner determines the classification.

Data Classifications

13
New cards

Confidentiality, integrity, availability, sensitivity, criticality are all goals of?

Data Classification

14
New cards

The type of data classification are

Sensitive - Confidential - Public - Restricted - Private - Critical

15
New cards

Refers to the physical or geographical location of data. In terms of cyber security, it can have multiple implications, such as legal and regulatory, compliance, data latency, and performance, risk management, data sovereignty and privacy.

Geolocation

16
New cards

Means that data is subject to the laws and regulations of the country where it is stored or processed. Ex: A U.S. company stores data on servers in France. That data must follow French data laws, not just U.S. laws

Data Sovereignty

17
New cards

Which of the following are methods to secure data.

Geographic restrictions - Encryption - Hashing - Masking - Tokenization - Obfuscation - Segmentation - Permission restrictions