Data Governance and Security Concepts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/52

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and definitions related to data governance, security protocols, data handling, and related agreements.

Last updated 1:49 AM on 4/13/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

53 Terms

1
New cards

Data Governance

The process of managing the availability of data, defining how data can be used, identifying who can access the data, and determining how the data is secured.

2
New cards

Data Loss Prevention (DLP)

Policies, procedures, and technology put in place to ensure data is only accessible to appropriate people while protecting it from corruption, exfiltration, or misuse.

3
New cards

Confidential Data

Data that is material to the operations of a business or government organization and is restricted from general knowledge.

4
New cards

Sensitive Data

Data that requires additional consideration regarding its treatment, often including items like social security numbers.

5
New cards

Private Data

A collective term for sensitive or confidential data that belongs to an individual or company but is collected and used by someone else.

6
New cards

Data at Rest

Data that is neither being actively used nor being transferred.

7
New cards

Data in Transit

Data that is actively being transferred between computer systems.

8
New cards

On-Path Attack

An attack where the threat actor makes an independent connection between two victims and can modify traffic.

9
New cards

Data Leakage

The unauthorized transfer of data from inside an organization to a destination outside its secured boundary.

10
New cards

Data Exfiltration

Any type of unauthorized data theft.

11
New cards

Data Retention

The process an organization uses to maintain control over certain data in order to comply with policies and laws.

12
New cards

Retention Policies

Dictates how long information needs to be kept available on backup and archive systems.

13
New cards

Personally Identifiable Information (PII)

One of the most common categories of private data, subject to many regulations.

14
New cards

Personal Information (PI)

Information that identifies, relates to, or could be linked to a particular individual or household.

15
New cards

Personal Health Information (PHI)

Information collected by healthcare professionals to identify an individual and determine care.

16
New cards

Payment Card Industry (PCI) Data

Any data related to a payment card, such as cardholder names and credit card numbers.

17
New cards

Data Sovereignty

The concept that the country where data is stored has legal control over that data.

18
New cards

Jurisdiction

The official power to make legal decisions and judgments.

19
New cards

Data Use Agreement

A legal agreement specifying what data will be shared and how it can be used.

20
New cards

Nondisclosure Agreement (NDA)

Defines the conditions under which an entity cannot disclose information to outside parties.

21
New cards

Acceptable Use Agreement

Describes how data can be used and for what purpose.

22
New cards

Memorandum of Understanding (MOU)

An acceptable use agreement that establishes the rules of engagement between two parties.

23
New cards

Data Encryption

The process of converting data into unreadable text using algorithms.

24
New cards

IPsec (Internet Protocol Security)

A network protocol suite used to secure data through authentication and encryption.

25
New cards

Symmetric Cryptography

A two-way encryption scheme where both encryption and decryption use the same key.

26
New cards

Data Masking

A security technique to hide data by modifying it without revealing its original value.

27
New cards

Data Pseudonymization

A technique that replaces or removes identifying information in a data set.

28
New cards

Data Anonymization

The process of removing personally identifiable information to keep individuals anonymous.

29
New cards

Data Discovery

The process of identifying data sets requiring protection versus those that can remain unchanged.

30
New cards

Logical Destruction

A process that targets data in memory storage for complete destruction while maintaining physical integrity.

31
New cards

Block Erase

A technique specifically for SSDs to fully erase memory blocks.

32
New cards

Cryptographic Erase

A technique that erases or replaces the media encryption key, making encrypted data illegible.

33
New cards

Physical Destruction

The act of damaging a digital storage device to make data unrecoverable.

34
New cards

Degaussing

A destruction method that scrambles information with a strong electromagnetic field.

35
New cards

Change Management

The controlled identification and implementation of required changes within a database.

36
New cards

Capacity Planning

Estimating resources required over future periods for hardware, software, and personnel.

37
New cards

Vulnerability Remediation Plan

A plan that addresses the discovery, elimination, and monitoring of vulnerabilities.

38
New cards

Authentication

The process of verifying if someone is who they say they are.

39
New cards

Authorization

Providing an authenticated user permission to access specific resources.

40
New cards

Multifactor Authentication (MFA)

Authentication requiring at least two different categories of factors.

41
New cards

Identity and Access Management (IAM)

Processes and technologies for the central management of digital identities.

42
New cards

Schema

A distinct namespace for the management and ownership of database objects.

43
New cards

Least Privilege

A principle stating that users should have the minimum rights necessary to perform their role.

44
New cards

Authorization Creep

A situation where a user gradually acquires more rights than necessary for their job.

45
New cards

Password Policy

A set of rules to enhance security by encouraging proper password usage.

46
New cards

Service Account

A digital identity used by applications to interact with other applications.

47
New cards

Physical Access Controls

Controls that restrict and monitor access to specific physical areas or assets.

48
New cards

Video Surveillance

Security control that uses cameras to monitor activities in a certain area.

49
New cards

Cooling Systems

Mechanical systems used to maintain a temperature lower than the ambient temperature.

50
New cards

HVAC

Control systems that maintain optimal heating, cooling, and humidity levels.

51
New cards

Firewall

A security tool that filters network traffic based on defined rules.

52
New cards

Perimeter Network (DMZ)

Architectural element that provides logical security between network segments.

53
New cards

Port Security

Prevents a device from communicating on the network unless it matches a given MAC address.