Data Security and Classification: Key Concepts for Cybersecurity

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Data Security

Protection of digital data from unauthorized access, corruption, or theft throughout its lifecycle.

2
New cards

Data Classification

The process of organizing data into categories based on sensitivity and importance (e.g., public, internal, confidential, sensitive).

3
New cards

Confidential Data

Information that must be protected from unauthorized access to safeguard privacy or proprietary interests.

4
New cards

Sensitive Data

Data that, if disclosed, could cause harm to individuals or organizations (e.g., health records, financial information).

5
New cards

Public Data

Information that can be freely shared without risk (e.g., press releases, marketing materials).

6
New cards

Confidentiality

Ensuring that information is accessible only to those authorized to have access.

7
New cards

Integrity

Maintaining and assuring the accuracy and completeness of data over its lifecycle.

8
New cards

Availability

Ensuring that authorized users have access to information and systems when needed.

9
New cards

Authentication

The process of verifying the identity of a user, device, or system.

10
New cards

Non-repudiation

Assurance that someone cannot deny the validity of their digital actions (e.g., sending a message or signing a document).

11
New cards

Information Assurance (IA)

Measures that protect and defend information systems by ensuring availability, integrity, authentication, confidentiality, and non-repudiation.

12
New cards

Security Breach

An incident where data is accessed without authorization, often resulting in data loss or exposure.

13
New cards

Threat Actor

An individual or group that poses a potential risk to cybersecurity (e.g., hackers, insiders, nation-states).

14
New cards

Vulnerability

A weakness in a system that can be exploited by a threat actor.

15
New cards

Exploit

A method or tool used to take advantage of a vulnerability.

16
New cards

Physical Security

Protection of hardware, software, networks, and data from physical actions and events (e.g., theft, vandalism, natural disasters).

17
New cards

Access Control

Mechanisms that restrict entry to physical or digital resources (e.g., key cards, biometrics).

18
New cards

Surveillance Systems

Tools like cameras and sensors used to monitor and protect physical environments.

19
New cards

Environmental Controls

Systems that protect IT infrastructure from environmental hazards (e.g., fire suppression, climate control).

20
New cards

Security Perimeter

Physical boundaries designed to prevent unauthorized access to sensitive areas.