Data Handling

Data Handling Life Cycle

  • Data experiences a unique life cycle through various stages: creating, utilizing, sharing, modifying, archiving, and destroying data.

    • Creating: Knowledge is initially tacit and becomes explicit.

    • Storing: Data is recorded to ensure accessibility and reference.

    • Using: Information may be modified, supplemented, or partially deleted based on interactions or requirements.

    • Sharing: Data is shared with other users; this can involve copying or moving data.

    • Archiving: Data is stored temporarily when not actively needed but must be retrievable if required.

    • Destroying: Data is disposed of when it is officially verified as no longer needed.

Importance of Data Security Life Cycle Model

  • The data security life cycle model aligns with the roles performed by individuals and organizations during the evolution of data.

  • Helps contextualize data states:

    • In Use: Data actively being processed.

    • At Rest: Data stored but not actively accessed.

    • In Motion: Data being transmitted or shared.

Activities Throughout Data Lifetime

  • There are six major activities for data as it evolves:

    • Data Handling Importance: Recognizing the assets that need protection based on their value.

    • Risk Assessment: Evaluating potential risks related to data loss, corruption, or unauthorized access.

Government Regulations on Data Handling

  • Data handling procedures can be influenced by regulatory standards:

    • In the US, OSHA mandates that medical records for workplace injuries must be retained for 30 years, while other medical records may be kept for 10 years.

    • Payment Card Industry Data Security Standard (PCI DSS) outlines the secure handling of credit card information.

    • GDPR in the EU includes strict regulations on how financial data must be protected.

  • Multiple jurisdictions may impose conflicting regulatory requirements on the same data set, necessitating thorough understanding and compliance.

Data Handling Practices

  • Classification and Labeling: Identifying the sensitivity of data to control access levels effectively.

  • Retention: Determining how long data will be kept and in what storage medium, often influenced by regulatory requirements.

  • Defensible Destruction: Ensuring a lawful basis for data destruction and utilizing valid methods to eliminate data effectively:

    • Physical Destruction: Disposal of hard drives or chips.

    • Digital Destruction: Ensuring deletions render data unrecoverable, beyond the simple act of emptying virtual trash.

  • Secure Data-Wiping Methods: Utilizing techniques like degaussing (using powerful magnets) to completely erase data from physical media.

Overview of Encryption

  • Encryption is fundamental in modern digital transactions, ensuring security and authenticity.

    • Cryptography is utilized to obscure meaning, rendering data unintelligible without decryption capabilities.

    • Plaintext: Original, readable data that can take many forms (e.g. images, text, databases).

    • Ciphertext: Encrypted data that appears as random characters and is unreadable without a key.

Integrity in Data Security

  • Hash Functions and Digital Signatures: Provide data integrity services:

    • Any alteration results in a different outcome, signaling potential tampering.

    • Confidentiality: Encryption conceals messages from unauthorized access.

Encryption System Components

  • Core components of an encryption system:

    • Algorithm: A set of rules or steps for encrypting and decrypting data.

    • Encryption Key: A piece of information that determines the output of the encryption algorithm.

    • Cryptovariables: Variables associated with the encryption process.

  • Ensuring robust key management is critical to security and accessibility.

Password Security

  • Passwords must be handled with care; secure password policies are paramount:

    • Hash values: Passwords stored as hashes maintain security by hiding their actual values.

    • Modern demands require secure alphanumeric passwords generated to minimize cracking risks.

Data Security Event Example

  • Raw logs can track unauthorized access attempts:

    • Logging is essential in determining events and accountability, often critical for audits and forensic assessments.

Common Security Policies

  • Clearly outlined during onboarding, related to roles enforcing information security processes.

    • Policies designed to meet organizational needs and regulatory compliance will have associated penalties for non-compliance.

Phishing Attacks

  • An overview of phishing attacks, including variations like whaling attacks targeting high-profile individuals.

  • Organizations must balance personal use of IT assets against security risks, shaping their acceptable use policies accordingly.

Historical Context of Encryption

  • Encryption methods have existed since ancient times, showcasing the human inclination to protect communication.

Key Management and Implementation of Encryption

  • Effective encryption relies on secure key management practices to prevent unauthorized access.

Hashing Concepts

  • Hashing creates a digest that uniquely identifies the input data:

    • Changes to input result in different hashes, signaling potential issues with data integrity.

Change Management Process

  • Describes the systematic approach to managing changes in an organization:

    • Request for Change (RFC): Starting point that includes evaluating, authorizing, testing, documenting, and implementing changes.

  • Rollback procedures are critical to restore systems in case of failure following changes.

Logging and Monitoring Security Events

  • The value of thorough logging practices is emphasized:

    • Key logs include user ID, system activities, timestamps, and access attempts.

  • Critical for identifying and addressing security incidents and maintaining compliance with retention policies.