- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 362字
- 2021-07-14 11:04:31
Data Loss Prevention (DLP)
Data can be traditionally grouped under three categories based on their criticality. They are as follows:
- Personally Identifiable Information (PII): Examples include birth dates, employee numbers, Social Security Numbers, national identification numbers, credit card information, personal health information, and so on.
- Intellectual Property (IP): Examples include product design documents, the source code of software, research information, patent applications, and customer data.
- Non-Public Information (NPI): Examples include financial information, mergers—€”and acquisitions-related information and activities, corporate policies, legal and regulatory matters, executive communication, and so on.
Compromising any of the preceding data will have adverse impacts on corporations. Additionally, risk factors, such as employee behavior, customer treatment, and financial controls, will also have an effect on organizations.
Data, whether it is PII, IP, or NPI, can exist in three states. Protection requirements in each of the three states may vary based on the type and classification of the information.
The three states in which a data can exist are as follows.
Data in motion
This refers to information as it moves around the organization. Examples include e-mail, FTP, and messaging:

Data protection strategies for such information include the following:
- Secure login and session procedures for file transfer services.
- Encryption for sensitive data.
- Monitoring activities to capture and analyze the content to ensure that confidential or privacy-related information are is not transmitted to third parties or stored in publicly accessible file server locations.
Data at rest
This refers to the information that is stored within the organization. Examples include information stored in a file server and shared locations and information in databases:

Data protection strategies include secure access controls, the segregation of duties, and the implementation of need to know mechanisms for sensitive data.
Data in use
This refers to information that is used by staff, as in laptops or portable devices, and information that is being printed or copied to a USB stick. This is the data available in endpoints.
Data security controls for data in use would include port protection and whole disk encryption. Controls against shoulder surfing, such as clear screen and clear desk policies, are also applicable to data in use controls:

- Mastering JavaScript Functional Programming
- 數(shù)字媒體應用教程
- C++程序設計(第3版)
- OpenDaylight Cookbook
- C#完全自學教程
- HBase從入門到實戰(zhàn)
- 樂高機器人設計技巧:EV3結(jié)構(gòu)設計與編程指導
- React.js Essentials
- Mastering Akka
- Visual Basic程序設計習題與上機實踐
- C編程技巧:117個問題解決方案示例
- Python商務數(shù)據(jù)分析(微課版)
- Android Studio開發(fā)實戰(zhàn):從零基礎到App上線 (移動開發(fā)叢書)
- Python無監(jiān)督學習
- Java編程指南:語法基礎、面向?qū)ο蟆⒑瘮?shù)式編程與項目實戰(zhàn)