Design
Data Concepts
Data Security
Data Policies
Plan Security Controls
100

The term for an organization that has collected or created data

Data Owner

100

The person who is legally responsible and accountable for a specific set of data, even if others manage it

Data Owner

100

 The term for how data is archived and deleted

Data Retention

100

This diagram shows what ports and protocols are used and what controls are applied

Data Flow

100

Used to describe the application of digital rights management tools and techniques to files

IRM (Incident Response Management)

200

Data based discovery method depending on specific traits of the data

Metadata

200

The process of labeling data based on its sensitivity and importance to the organization

Data Classification

200

This disposal technique does not work with solid-state drives, flash media, and USB thumb drives

Degaussing

200

At what periods might a legal hold occur?

Law enforcement or a regulator does an investigation; A private entity takes legal action; Litigation

200

Set of proactive, business-wide practices that contribute to an organization's security, risk tolerance profile and strategic decisions

IRM (Incident Response Management)

300

What the data type of the extensible markup language is

Semi-Structured

300

A security method that protects data by turning it into unreadable code unless you have the proper key

Encryption

300

Name two issues with Log Review

Not a priority, expensive, repetitive, reviewer understanding

300

Assigned to data based on organizational policies and characteristics of a dataset

Data Classification

300

Describes the specific actions users can take regarding data

Data Rights

400

The entity that is responsible for manipulating, storing, and moving data

Data Processor

400

The process of scanning systems to locate where sensitive data is stored: Metadata

Data Discovery

400

The length of time an organization should keep data

Retention Period

400

The actions that authorized users can take on a given asset

Data Rights

400

Document used to validate the identity of a user or computer

Certificate

500

Type of classification system used by the military

Sensitivity

500

The method of permanently deleting or destroying data so it cannot be recovered or misused

Data Destruction

500

Databases are an example of this classification of data

Structured Data

500

This policy should specify requirements for how data is archived

Retention Policy

500

List two issues with employing IRM in a locally based cloud environment

Replication Restrictions, Jurisdictional conflicts, Agent Conflicts, Mapping issues, API Conflicts

M
e
n
u