20 Questions
What are the three states that security professionals consider when thinking about data security?
Data at rest, data in motion, and data in use
Which type of data is vulnerable to theft if an attacker gains access to the storage media?
Data at rest
What are examples of data at rest?
Data on a hard drive, in a cloud service, and on a magnetic tape
What does data in motion refer to?
Data moving around a network between two systems
Why must information security professionals protect against both physical and logical access to storage media?
Both methods can be effective ways to steal data
Why is it important to protect data in motion?
To prevent unauthorized access during data transmission over public networks
What is an example of using encryption to protect sensitive information at rest?
File encryption to protect data stored on a device
What is the primary concern for securing big data storage and analysis?
Protecting personally identifiable information and controlling access to it
What is the purpose of using access controls in data protection?
To prevent unauthorized access to information stored on devices
Why might big data rarely use relational databases?
Because relational databases cannot handle the large data sets used in big data processing
What is the primary focus of information security professionals when considering data security?
Preventing unauthorized access to data at rest, in motion, and in use
In what state is data vulnerable to theft if an attacker gains access to the storage media?
Data at rest
What does 'data in motion' refer to in the context of data security?
Data moving between two systems over a network
What is the primary purpose of using encryption in data protection?
To protect sensitive information when it is in transit
Which method can be an effective way to steal data at rest?
Hacking into an operating system
Why does big data rarely use relational databases?
Because of the significant overhead involved in using relational databases
What is the main concern for securing big data storage and analysis?
Managing access controls and permissions effectively
What is the purpose of access controls in data protection?
To restrict access to sensitive information on storage devices
What does data in use refer to?
Data that is being actively used in a system's memory
Why should organizations have clear policies surrounding the appropriate use of data and security controls?
To ensure sensitive information is not accessed by other processes
This quiz covers the fundamental concepts of data security, including the importance of confidentiality, integrity, and availability of information assets. It provides insight into the security controls used to protect data within an organization.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free