Data Protection
Data Protection
I am following Jason Dion’s Security+ course on Udemy to prepare for the CompTIA Security+ certification.
Data Protection
The process of protecting/safeguarding important information from corruption, compromise, or loss.
Data Classifications
Category based on the organization’s value and the sensitivity of the information if disclosed:
- Sensitive Data: Information that could lead to security loss or competitive disadvantage if accessed by unauthorized parties
- Confidential Data: Trade secrets, intellectual property, and source code that impact business operations if exposed
- Public Data: Information that can be freely shared without organizational impact
- Restricted Data: Requires special authorization for access
- Private Data: Internal-only information (e.g., salary data)
- Critical Data: High-value assets (e.g., credit card numbers)
Government Data Classifications
- Unclassified: Publicly releasable under FOIA
- Sensitive but Unclassified: Non-national security data that could impact individuals
- Confidential: Could cause serious government damage if leaked
- Secret: Could significantly damage national security
- Top Secret: Would severely compromise national security
Data Ownership
Responsibility for information assets’ confidentiality, integrity, availability, and privacy:
- Data Owners: Senior executives responsible for information security
- Data Controllers: Decide data storage/usage methods and ensure legality
- Data Processors: Entities handling data collection/processing
- Data Stewards: Ensure data quality and metadata management
- Data Custodians: Manage storage systems (e.g., sysadmins)
- Data Privacy Officers: Oversee PII, SPII, and PHI compliance
Data States
Data at Rest
Stored in databases/filesystems:
- Encryption Methods:
- Full Disk Encryption (FDE)
- Partition/File/Volume Encryption
- Database/Record Encryption
Data in Transit
Moving between locations (e.g., email):
- Encryption Methods:
- SSL/TLS
- VPNs
- IPSec
Data in Use
Being created/processed:
- Protection Methods:
- Application-level security
- Access controls
- Secure enclaves (e.g., Intel SGX)
Data Types
- Regulated Data: PII/PHI governed by laws (GDPR, HIPAA)
- Trade Secrets: Proprietary business information
- Intellectual Property: Inventions, creative works, trademarks
- Legal Information: Contracts/compliance documents
- Financial Data: Transactions, invoices, tax records
- Human/Non-human Readable: Structured vs raw data
Data Sovereignty
Information subject to laws of the nation where collected (e.g., GDPR requirements).
Data Lifecycle
- Collection
- Retention
- Disposal
Data Security Measures
- Geographic Restrictions
- Encryption (AES, RSA)
- Hashing (SHA-256)
- Masking (Partial data redaction)
- Tokenization (Data substitution)
- Obfuscation (Deliberate ambiguity)
- Segmentation (Network zoning)
- Permission Restrictions (RBAC, ABAC)
Data Loss Prevention (DLP)
Strategies to prevent sensitive data exfiltration:
- Endpoint DLP: Monitor data in use
- Network DLP: Inspect data in transit
- Storage DLP: Scan data at rest
- Cloud DLP: SaaS-based protection
💡 Join the discussion:
For questions or collaboration opportunities, visit our ZeroDayMindset Discussion Board
This post is licensed under CC BY 4.0 by the author.