Data Governance & Privacy
Secure Development
More Software vulnerabilities
Cloud Models & Cloud Security
De-Identification & Re-Identification Attacks
100

This process manages information throughout its entire lifecycle.

What is data governance?

100

This SDLC method uses seven distinct phases including requirements, design, implementation, testing, and retirement.

What is the Waterfall SDLC?

100

A web attack commonly enabled by poor input validation where injected script runs in the victim’s browser under the trusted site’s permissions.

What is cross-site scripting (XSS)?

100

This cloud model is “multitenant,” where multiple consumers share the same resource pool.

What is public cloud?

100

This de-identification control hides sensitive values by redacting all or part of the data (often replacing characters with “X”)

What is data masking?

200

The first step in the data lifecycle where labels are applied to indicate privacy/confidentiality.

What is data classification?

200

In Waterfall, this phase is where code is written and built into units that are later integrated.

What is the Implementation phase?

200

This defense uses placeholders so the database executes only known-safe intent, reducing injection risk.

What are parameterized queries?

200

A model combining public and private cloud—meaning the organization takes on security concerns of both.

What is hybrid cloud?

200

This technique replaces a field’s value with a randomly generated substitute while storing the original value in a separate vault—making it reversible when authorized.

What is tokenization?

300

The highest level in the military-style classification scheme.

What is Top Secret?

300

This life cycle approach runs phases concurrently on smaller modules and can become somewhat open-ended.

What is Agile SDLC?

300

A testing technique that sends invalid/unexpected/randomized inputs to find bugs and vulnerabilities.

What is fuzzing?

300

Software that mediates access to cloud services, adds visibility into usage, and commonly supports DLP features.

What is a CASB (Cloud Access Security Broker)?

300

This method generalizes data (like replacing an exact age with an age range) to reduce identifiability.

What is aggregation/banding?

400

When information’s classification label is downgraded because it no longer needs the same protections.

What is declassification?

400

In SDL, this phase includes “white box” source code analysis and code review to identify vulnerabilities.

What is the Implementation phase (in SDL)?

400

If you see one password attempted once across many accounts in logs, this attack is likely occurring.

What is password spraying?

400

This XML-based federation standard lets an Identity Provider authenticate a user and pass an authentication token to a Service Provider.

What is SAML?

400

This attack combines a de-identified dataset with other sources (like public records) to find overlaps and reveal identities.

What is a re-identification attack?

500

This regulation requires disclosure of personal-data breaches and commonly uses a ~72-hour notification window.

What is GDPR?

500

A type of privilege escalation where a low-privilege user performs admin/root-level functions they shouldn’t be allowed to.

What is vertical privilege escalation?

500

A common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed 

What is SQLi (SQL injection)
500

This security approach assumes no implicit trust (even inside the network) and requires continuous verification of users, devices, and sessions.

What is Zero Trust?

500

A specific re-identification approach that links an unidentified dataset to easier-to-obtain auxiliary information about individuals to find overlaps.

What is a linkage attack?

M
e
n
u