Information Technology /Security+ (SY0-701): Lesson 16: Summarize Data Protection Part 2
Security+ (SY0-701): Lesson 16: Summarize Data Protection Part 2
This flashcard deck covers key concepts from the Security+ (SY0-701) Lesson 16, focusing on data protection methods, DLP components, and security awareness training.
Define 'data at rest'
The data is in some sort of persistent storage media.
Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/25
Key Terms
Term
Definition
Define 'data at rest'
The data is in some sort of persistent storage media.
How is data at rest typically secured?
By implementing some form of encryption (FDE, database encryption, file/folder) or access control.
Define 'data in transit/motion'
When data is transmitted over a network.
How is data in transit/motion secured?
By implementing a transport encryption protocol, such as TLS or IPSec.
Define 'data in use'
When data is present in volatile memory, such as system RAM or CPU registers and cache.
How can data in use be secure?
Although most data needs to be decrypted from rest in order to be used, trusted execution environment (TEE) mechanisms are able to encrypt data as it ...
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
Define 'data at rest' | The data is in some sort of persistent storage media. |
How is data at rest typically secured? | By implementing some form of encryption (FDE, database encryption, file/folder) or access control. |
Define 'data in transit/motion' | When data is transmitted over a network. |
How is data in transit/motion secured? | By implementing a transport encryption protocol, such as TLS or IPSec. |
Define 'data in use' | When data is present in volatile memory, such as system RAM or CPU registers and cache. |
How can data in use be secure? | Although most data needs to be decrypted from rest in order to be used, trusted execution environment (TEE) mechanisms are able to encrypt data as it exists in memory. |
What is the function of data loss prevention (DLP) software? | To automate the discovery and classification of data types and enforce rules so that data is not viewed or transferred without a proper authorization. |
What are the 3 typical components of Data loss prevention (DLP) products? |
|
What is the purpose of a Data loss prevention (DLP) policy server? | To configure classification, confidentiality, and privacy rules and policies, log incidents, and compile reports. |
What is the purpose of a Data loss prevention (DLP) endpoint agent? | To enforce policy on client computers, even when they are not connected to the network. |
What is the purpose of a Data loss prevention (DLP) network agent? | To scan communications at network borders and interface with web and messaging servers to enforce policy. |
This method of data protection is often associated with payment processing systems. | Tokenization; Replaces sensitive data (such as a credit card number) with a randomly generated token while securely storing the original data in a separate location. |
Define a 'tombstone' mechanism | a Data loss prevention (DLP) mechanism where original file is quarantined and replaced with one describing the policy violation and how the user can release it again. |
Define a 'code of conduct' | Rules of behavior and ethical standards; Sets out expected professional standards. |
Define a 'clean desk policy' | Organizational policy that mandates employee work areas be free from potentially sensitive information. |
When educating end users, what should be of focus? | Responsibilities and threats that are relevant to users in a language they can understand. |
What are methods of employee education? | Facilitated workshops and events, one-on-one instruction and mentoring, plus resources such as computer-based or online training, videos, books, and blogs/newsletters. |
Define 'Computer-based training (CBT)' | Training and education programs delivered using computer devices and e-learning instructional models and design. |
What are forms of Computer-based training (CBT)? | Simulations; branching scenarios. |
What is a branching scenario? | Having students choose between options to find the best choices to solve a cybersecurity incident or configuration problem. |
Define 'Anomalous behavior recognition' | Actions or patterns that deviate significantly from expectations; Systems that automatically detect users, hosts, and services that deviate from what is expected. |
How can end users support anomalous behavior recognition? | By training employees to recognize and report anomalous behavior. |
What are examples of anomalous behavior? | Unusual network traffic, user account activity anomalies, insider threat actions, abnormal system events, and fraudulent transactions. |
What mechanisms are used to automatically detect anomalous behavior? | Network intrusion detection, user behavior analytics, system log analysis, and fraud detection. |
In order, what are the 7 stages of the security awareness training lifecycle? |
|