CHAPTER 4 - Data Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/134

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

135 Terms

1
New cards

Data Security

− Planning, development, and execution

− Security policies and procedures

− Authentication, authorization, access, and auditing of data and information assets

2
New cards

Data Security

definition, planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets

3
New cards

Stakeholders, government regulations, proprietary business concerns, legitimate access needs, contractual obligations

5 factors where Requirements for data security come from

4
New cards

Stakeholders

where requirements come from for data sec. Organizations must recognize the privacy and confidentiality needs of their ____________.

5
New cards

Government regulations

where requirements come from for data sec. are in place to protect the interests of some stakeholders.

6
New cards

Proprietary business concerns

where requirements come from for data sec. Each organization has their own data to protect.

7
New cards

Legitimate access needs

where requirements come from for data sec. Business processes require individuals in certain roles be able to access, use, and maintain data.

8
New cards

Contractual obligations

where requirements come from for data sec. Non-disclosure agreements.

9
New cards

Risk Reduction

Increase in data regulations ○ Data Thefts ○ Breaches

10
New cards

sensitive

in risk reduction. Identify and classify _________ data assets

▪ Depending on the industry and organization, there can be few or many assets, and a range of ********* data (including personal identification, medical, financial, and more).

11
New cards

Locate

in risk reduction. ______ sensitive data throughout the enterprise

▪ Security requirements may differ, depending on where data is stored. A significant amount of sensitive data in a single location poses a high risk due to the damage possible from a single breach.

12
New cards

Asset

in risk reduction. Determine how each _____ needs to be protected

▪ The measures necessary to ensure security can vary between assets, depending on data content and the type of technology.

13
New cards

business processes

in risk reduction. Identify how this information interacts with ________ _________

▪ Analysis of business processes is required to determine what access is allowed and under what conditions.

14
New cards

Collaboration

in guiding principles.

▪ Data Security is a collaborative effort involving IT security administrators, data stewards/data governance, internal and external audit teams, and the legal department.

15
New cards

Enterprise Approach

in guiding principles.

▪ Data Security standards and policies must be applied consistently across the entire organization.

16
New cards

Proactive Management

in guiding principles.

▪ Success in data security management depends on being proactive and dynamic, engaging all stakeholders, managing change, and overcoming organizational or cultural bottlenecks such as traditional separation of responsibilities between information security, information technology, data administration, and business stakeholders.

17
New cards

Clear Accountability

in guiding principles.

▪ Roles and responsibilities must be clearly defined, including the 'chain of custody' for data across organizations and roles.

18
New cards

chain of custody

refers to the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of materials, particularly in legal contexts.

19
New cards

Metadata-driven

in guiding principles.

▪ Security classification for data elements is an essential part of data definitions.

20
New cards

Reduce Risk by Reducing Exposure

in guiding principles.

▪ Minimize sensitive/confidential data proliferation, especially to non-production environments.

21
New cards

Business Growth

− Security as an Asset

− Includes attaining and sustaining operational business goals

22
New cards

access , compliance, stakeholder

The goals of data security activities include:

○ Enabling appropriate ______ and preventing inappropriate access to enterprise data assets

○ Enabling __________ with regulations and policies for privacy, protection, and confidentiality

○ Ensuring that ___________ requirements for privacy and confidentiality are enforced and audited.

23
New cards

Vulnerability

A weakness or defect in a system that allows it to be successfully attacked and compromised - essentially a hole in an organization's defenses.

24
New cards

Exploits

Some vulnerabilities are called ________.

25
New cards

Threat

A potential offensive action that could be taken against an organization. Can be internal or external, not always malicious.

26
New cards

Remediation

Threats may relate to specific vulnerabilities, which then can be prioritized for ___________.

27
New cards

Threat, damage

Each threat should match to a capability that either prevents the ______ or limits the ______ it might cause.

28
New cards

Attack Surface

An occurrence of a threat is also called an ______ _______.

29
New cards

Risk

Refers both to the possibility of loss and to the thing or condition that poses the potential loss.

30
New cards

Risk

can be calculated for each possible threat using the following factors.

− Probability that the threat will occur and its likely frequency

− The type and amount of damage created each occurrence might cause, including damage to reputation

− The effect damage will have on revenue or business operations

− The cost to fix the damage after an occurrence

− The cost to prevent the threat, including by remediation of vulnerabilities

− The goal or intent of the probable attacker

31
New cards

Risk Classifications

these Describe the sensitivity of the data and the likelihood that it might be sought after for malicious purposes. They are used to determine who (i.e., people in which roles) can access the data.

32
New cards

Entire

The highest security classification of any datum within a user entitlement determines the security classification of the ______ aggregation.

33
New cards

Critical Risk Data

risk classification.

○ Personal information aggressively sought for unauthorized use by both internal and external parties due to its high direct financial value.

○ Compromise of CRD would not only harm individuals, but would result in financial harm to the company from significant penalties, costs to retain customers and employees, as well as harm to brand and reputation.

34
New cards

High Risk Data

risk classification.

○ Actively sought for unauthorized use due to its potential direct financial value.

○ Provides the company with a competitive edge.

○ If compromised, it could expose the company to financial harm through loss of opportunity.

○ Loss of HRD can cause mistrust leading to the loss of business and may result in legal exposure, regulatory fines and penalties, as well as damage to brand and reputation.

35
New cards

Moderate Risk Data

risk classification.

○ Company information that has little tangible value to unauthorized parties: however, the unauthorized use of this non-public information would likely have a negative effect on the company.

36
New cards

Information security

Depending on the size of the enterprise, the overall ___________ ________ function may be the primary responsibility of a dedicated Information Security group, usually within the Information Technology (IT) area.

37
New cards

Chief Information Security Officer

Larger enterprises often have a _____ ___________ ________ _______ (CISO) who reports to either the CIO or the CEO.

38
New cards

Access, audit, authentication, authorization

4 A's in data security requirements and procedures

39
New cards

Access

one of the 4 A's. Enable individuals with authorization to ______ systems in a timely manner.

40
New cards

Audit

one of the 4 A's. Review security actions and user activity to ensure compliance with regulations and conformance with company policy and standards.

41
New cards

Authentication

one of the 4 A's. Validate users' access.

42
New cards

Authorization

one of the 4 A's. Grant individuals privileges to access specific views of data, appropriate to their role.

43
New cards

Entitlement

The sum total of all the data elements that are exposed to a user by a single access authorization decision.

44
New cards

Monitoring

Systems should include __________ controls that detect unexpected events, including potential security violations. Systems containing confidential information, such as salary or financial data, commonly implement active, real time monitoring that alerts the security administrator to suspicious activity or inappropriate access.

45
New cards

Encryption

The process of translating plain text into complex codes to hide privileged information, verify complete transmission, or verify the sender's identity.

46
New cards

Decryption

Encrypted data cannot be read without the __________ key or algorithm, which is usually stored separately and cannot be calculated based on other data elements in the same data set.

47
New cards

Hash, symmetric, private key, public key

4 main methods of data encryption

48
New cards

Hash

one of the 4 main methods of encryption. Uses algorithms to convert data into a mathematical representation.

49
New cards

Hash

The exact algorithms used and order of application must be known in order to reverse the encryption process and reveal the original data.

50
New cards

MD5, SHA

2 Common Hashing Algorithms

51
New cards

Message Digest 5

(MD5)

52
New cards

Secure Hashing Algorithm

(SHA)

53
New cards

Private-key

one of the 4 main methods of encryption.

○ Uses one key to encrypt the data. Both the sender and the recipient must have the key to read the original data.

○ Data can be encrypted one character at a time (as in a stream) or in blocks.

54
New cards

DES, 3DES, AES, IDEA

4 common private-key algorithms

55
New cards

Data Encryption Standard

(DES)

56
New cards

Triple DES

(3DES)

57
New cards

Advanced Encryption Standard

(AES)

58
New cards

International Data Encryption Algorithm

(IDEA).

59
New cards

Public-key

one of the 4 main methods of encryption.

○ The sender and the receiver have different keys.

○ The sender uses a ______ ___ that is freely available, and the receiver uses a private key to reveal the original data.

○ This type of encryption is useful when many data sources must send protected information to just a few recipients, such as when submitting data to clearinghouses.

60
New cards

RSAM, Diffie-Helman Key Agreement

2 Public-key Methods

61
New cards

Rivest-Shamir-Adelman

(RSA)

62
New cards

Pretty Good Privacy

PGP

63
New cards

PGP

A freely available application of public-key encryption.

64
New cards

Obfuscation or Masking

Data can be made less available by ___________ (making obscure or unclear) or _______, which removes, shuffles, or otherwise changes the appearance of the data, without losing the meaning of the data or the relationships the data has to other data sets, such as foreign key relationships to other objects or systems.

65
New cards

Persistent, dynamic

Two Types of Data Masking

66
New cards

In-flight persistent masking

Occurs when the data is masked or obfuscated while it is moving between the source (typically production) and destination (typically nonproduction) environment.

67
New cards

In-flight persistent masking

Very secure when properly executed because it does not leave an intermediate file or database with unmasked data.

68
New cards

In-place persistent masking

Used when the source and destination are the same. The unmasked data is read from the source, masked, and then used to overwrite the unmasked data.

69
New cards

In-place persistent masking

Assumes the sensitive data is in a location where it should not exist and the risk needs to be mitigated, or that there is an extra copy of the data in a secure location to mask before moving it to the non-secure location.

70
New cards

Dynamic Data Masking

Changes the appearance of the data to the end user or system without changing the underlying data. This can be extremely useful when users need access to some sensitive production data, but not all of it.

71
New cards

Substitution, shuffling, temporal variance, value variance, nulling or deleting, randomization, encryption, expression masking, key masking

9 masking methods

72
New cards

Substitution

method of masking. Replace characters or whole values with those in a lookup or as a standard pattern. For example, first names can be replaced with random values from a list.

73
New cards

Shuffling

method of masking. Swap data elements of the same type within a record or swap data elements of one attribute between rows. For example, mixing vendor names among supplier invoices such that the original supplier is replaced with a different valid supplier on an invoice.

74
New cards

Temporal variance

method of masking. Move dates +/- a number of days - small enough to preserve trends, but significant enough to render them non-identifiable.

75
New cards

Value variance

method of masking. Apply a random factor +/- a percent, again small enough to preserve trends, but significant enough to be non-identifiable.

76
New cards

Nulling or deleting

method of masking. Remove data that should not be present in a test system.

77
New cards

Randomization

method of masking. Replace part or all of data elements with either random characters or a series of a single character.

78
New cards

Encryption

method of masking. Convert a recognizably meaningful character stream to an unrecognizable character stream by means of a cipher code. An extreme version of obfuscation inplace.

79
New cards

Expression masking

method of masking. Change all values to the result of an expression. For example, a simple expression would just hardcode all values in a large free form database field (that could potentially contain confidential data) to be 'This is a comment field'.

80
New cards

Key masking

method of masking. Designate that the result of the masking algorithm/process must be unique and repeatable because it is being used mask a database key field (or similar). This type of masking is extremely important for testing to maintain integrity around the organization.

81
New cards

Rest, motion

Data security includes both:

− Data-at-____

− Data-in-______

82
New cards

Data in motion

requires a network in order to move between systems. It is no longer sufficient for an organization to wholly trust in the firewall to protect it from malicious software, poisoned email, or social engineering attacks.

83
New cards

Backdoor

Refers to an overlooked or hidden entry into a computer system or application. It allows unauthorized users to bypass the password requirement to gain access.

84
New cards

Backdoor

Are often created by developers for maintenance purposes. Any existence of it is a security risk.

85
New cards

Backdoor

Default passwords left unchanged when installing any software system or web page package is a ________ and will undoubtedly be known to hackers.

86
New cards

Bot or Zombie

A workstation that has been taken over by a malicious hacker using a Trojan, a Virus, a Phish, or a download of an infected file.

87
New cards

Bot or Zombie

Remotely controlled, they are used to perform malicious tasks, such as sending large amounts of spam, attacking legitimate businesses with network-clogging Internet packets, performing illegal money transfers, and hosting fraudulent websites.

88
New cards

Bot-Net

A network of robot computers (infected machines).

89
New cards

Cookie

A small data file that a website installs on a computer's hard drive, to identify returning visitors and profile their preferences. Are used for Internet commerce. They are also controversial, as they raise questions of privacy because spyware sometimes uses them.

90
New cards

Firewall

Software and/or hardware that filters network traffic to protect an individual computer or an entire network from unauthorized attempts to access or attack the system.

91
New cards

Firewall

May scan both incoming and outgoing communications for restricted or regulated information and prevent it from passing without permission (Data Loss Prevention).

92
New cards

Perimeter

The boundary between an organization's environments and exterior systems. Typically, a firewall will be in place between all internal and external environments.

93
New cards

DMZ

Short for de-militarized zone

94
New cards

DMZ

An area on the edge or perimeter of an organization, with a firewall between it and the organization. A ___ environment will always have a firewall between it and the internet.

95
New cards

DMZ environments

Are used to pass or temporarily store data moving between organizations.

96
New cards

Super User Account

An account that has administrator or root access to a system to be used only in an emergency

97
New cards

Key Logger

A type of attack software that records all the keystrokes that a person types into their keyboard, then sends them elsewhere on the Internet.

98
New cards

Penetration Testing

Sometimes called 'penn test'. An ethical hacker, either from the organization itself or hired from an external security firm, attempts to break into the system from outside, as would a malicious hacker, in order to identify system vulnerabilities.

99
New cards

VPN

Use the unsecured internet to create a secure path or 'tunnel' into an organization's environment. The tunnel is highly encrypted.

100
New cards

VPN

It allows communication between users and the internal network by using multiple authentication elements to connect with a firewall on the perimeter of an organization's environment.