Threats to Data Protection
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Time
15 hours 43 minutes
Difficulty
Advanced
CEU/CPE
16
Video Transcription
00:00
>> Let's talk about a couple of threats to data.
00:00
We covered protecting data across all its states,
00:00
at rest, in transit, and in process.
00:00
But let's talk about some of
00:00
the security concerns we have directly.
00:00
The first of the security concerns that we have is
00:00
unauthorized access or usage.
00:00
Unauthorized disclosure can also fall in this category.
00:00
The first things that we think about
00:00
as far as blocking unauthorized usage
00:00
is making sure that only
00:00
the appropriate people have
00:00
access to the data in the first place.
00:00
That's going to require
00:00
that we use strong authentication.
00:00
If you claim to have administrative access,
00:00
you have to prove that you
00:00
are legitimately an administrator.
00:00
Now a lot of times in the past we've used
00:00
things like passwords to provide authentication.
00:00
But by today's standards, passwords
00:00
really aren't that secure today.
00:00
So for strong authentication,
00:00
we'd want a combination of something you know,
00:00
something you have, and something you are.
00:00
Maybe a password and a key
00:00
>> or maybe key and a thumbprint
00:00
>> or a thumbprint and a pin.
00:00
>> That's multi-factor authentication and
00:00
that's going to help us limit who has access to data.
00:00
We can also think about encrypting our data.
00:00
Of course, that's what our next domain, Chapter 3,
00:00
is going to cover in good depth is,
00:00
how we encrypt data
00:00
>> and we protect it through encryption.
00:00
>> Now we've also got some tools: obfuscation,
00:00
anonymization, tokenization, and masking.
00:00
Now these we're going to go to in
00:00
more depth in a later slides.
00:00
So I'm just going to leave that here.
00:00
I'll also mention that for unauthorized usage,
00:00
we can do things like make sure we have
00:00
good policies in place and a layered defense.
00:00
For instance, the policy of principle of need to know.
00:00
It says you're only going to
00:00
>> get access to data that you
00:00
>> absolutely have a business need to access.
00:00
So that's going to limit unauthorized usage as well.
00:00
Other concerns when we think about protecting
00:00
our data is liability.
00:00
Remember, if we are
00:00
governing entities within organization,
00:00
we could be found liable if we fail to
00:00
protect company data to the degree that's required.
00:00
So we have to make sure we
00:00
use due care and due diligence.
00:00
Third party governance is going to be important as well.
00:00
Threats to the availability of data,
00:00
denial of service,
00:00
and distributed denial-of-service attacks.
00:00
It's not just confidentiality that we're concerned about.
00:00
Remember that CIA triad.
00:00
So here is the A, availability.
00:00
Denial of service and distributed denial of
00:00
services may make our data unreachable.
00:00
So some of the ways that we address that is through
00:00
data redundancy and then there's
00:00
also what's called data dispersion,
00:00
which means that we have data
00:00
stored in multiple physical locations.
00:00
Again, that really ties into redundancy.
00:00
Now for issues surrounding corruption and modification,
00:00
there's the eye of the site,
00:00
CIA triad, that's integrity.
00:00
We think about using controls like
00:00
hashes and digital signatures.
00:00
We will cover those in Chapter 3.
00:00
That's just a short reference to them.
00:00
We'll explain them in the next chapter.
00:00
Data leakage and breaches.
00:00
We need data loss prevention systems, DLPs.
00:00
With DLP systems, what they
00:00
do is they evaluate data based on
00:00
specific formats and they can
00:00
prevent exfiltration of certain types of data.
00:00
For instance, they can prevent certain types of
00:00
data from being printed or emailed
00:00
or uploaded or sent to another device.
00:00
So your DLP systems are really
00:00
critical to prevent data loss and
00:00
many regulations are going
00:00
to mandate that an organization
00:00
have a DLP in order to protect the safety of its data.
00:00
We also mentioned the TPM chip in the last section,
00:00
making sure that if a hard drive is compromised,
00:00
that still there's a key that's required to access
00:00
the hard drive and that's going to
00:00
limit some of the damage.
00:00
Then we also want to think about malware.
00:00
Malware is probably the most common threat that
00:00
users are exposed to
00:00
and the best way to deal with malware,
00:00
just don't get it, and the way we just don't get
00:00
it is that we have good anti-malware applications,
00:00
we scan our systems,
00:00
we keep our anti-malware apps up to date,
00:00
>> and we have a strategy for responding to
00:00
>> malware and for eradicating malware from our systems.
00:00
Then last but not least,
00:00
we have to consider the end of life cycle
00:00
>> of our data and how we properly
00:00
>> dispose off that data and then
00:00
sanitize our storage devices for any sort of remnants.
00:00
That was just a quick overview of
00:00
some of the concerns that we face when we're
00:00
working with data and
00:00
the ways that we can
00:00
protect data against those common threats.
Up Next
Instructed By
Similar Content