Enterprise Information Security-12
Enterprise Information Security-12
has access to sensitive data, and to ensure that only authorized personnel have access
to it. This can be particularly difficult in large organizations with complex systems and
processes.
• Managing access to sensitive data: Once access to sensitive data has been granted, it
can be difficult to manage and track who is accessing the data and how it is being
used.
• Ensuring data is secure in transit and at rest: It can be challenging to ensure that
sensitive data is secure when it is being transmitted from one location to another, or
when it is being stored on a device or in a database.
• Balancing security with usability: One of the challenges of DLP is finding the right
balance between security and usability. On the one hand, it is important to implement
strong security measures to protect sensitive data. On the other hand, these
measures should not be so burdensome that they impede the ability of authorized
users to access and use the data.
Overall, DLP involves identifying, preventing, and mitigating the risk of sensitive or
confidential data being accidentally or intentionally disclosed to unauthorized parties.
Implementing DLP can be challenging due to the need to identify and manage access to
sensitive data, ensure data is secure in transit and at rest, and balance security with usability.
Encryption in-Transit
Encryption in-transit refers to the process of encrypting data while it is being transmitted from
one location to another, such as over a network or the internet. This is done to protect the
data from being intercepted or accessed by unauthorized parties while it is in transit.
• Transport Layer Security (TLS) or Secure Sockets Layer (SSL): These protocols are used
to encrypt data transmitted over the internet, such as web traffic or email.
• Virtual Private Networks (VPNs): VPNs create a secure, encrypted connection
between two or more devices over the internet, allowing data to be transmitted
securely.
110
• File transfer protocols (FTPs): FTPs are used to securely transmit files over the
internet. Some FTPs, such as SFTP (Secure FTP), use encryption to protect data in
transit.
• Encrypted messaging apps: There are many messaging apps that use encryption to
protect the data transmitted between users.
Overall, encryption in-transit helps to protect data from being intercepted or accessed by
unauthorized parties while it is being transmitted from one location to another.
Encryption at-Rest
Encryption at-rest refers to the process of encrypting data when it is stored, rather than when
it is in transit. This is done to protect the data from being accessed by unauthorized parties
while it is stored on a device or in a database.
• Full-disk encryption: This type of encryption encrypts all of the data on a device's hard
drive or storage media, making it unreadable without a decryption key.
• File-level encryption: This type of encryption encrypts individual files or folders, rather
than the entire disk.
• Database encryption: This type of encryption encrypts data stored in a database, such
as sensitive customer or financial information.
• Cloud storage encryption: Many cloud storage providers offer encryption options to
protect data stored in the cloud.
Overall, encryption at-rest helps to protect data from being accessed by unauthorized parties
while it is stored on a device or in a database.
Encryption Levels
Encryption is a process of encoding data to make it unreadable to anyone without the
appropriate key or password. The strength of an encryption algorithm is typically measured
by its key length, which refers to the number of bits that are used to generate the encryption
key. The longer the key length, the more secure the encryption.
111
There are several levels of encryption that can be used, depending on the sensitivity of the
data being protected and the level of security required. Some common encryption levels
include:
• 128-bit encryption: This is a relatively basic level of encryption that is commonly used
for secure web browsing and other low-risk applications.
• 192-bit encryption: This level of encryption is considered more secure than 128-bit
encryption and is often used for protecting sensitive data, such as financial
transactions.
• 256-bit encryption: This is the highest level of encryption currently in use and is
considered extremely secure. It is often used to protect highly sensitive data, such as
government secrets or military communications.
Some examples of encryption algorithms that are widely considered to be very secure include:
• AES (Advanced Encryption Standard): This is a widely used encryption algorithm that
is considered very secure. It has a key length of 128, 192, or 256 bits and is used to
protect a wide range of sensitive data, including financial transactions and
government communications.
• RSA (Rivest-Shamir-Adleman): This is a public-key encryption algorithm that is widely
used to secure data transmitted over the internet. It is considered very secure, but its
key length can vary, with longer keys providing greater security.
• ECC (Elliptic Curve Cryptography): This is a relatively new encryption algorithm that is
considered very secure and is gaining popularity for use in a wide range of
applications. It uses a much shorter key length than other algorithms but is considered
to be just as secure due to the complex mathematical calculations involved.
112
Symmetric and asymmetric Encryption
Symmetric and asymmetric encryption are two different types of encryption algorithms that
are used to protect data transmitted over the internet or other networks.
Symmetric encryption, also known as shared secret encryption, is a type of encryption that
uses the same key to both encrypt and decrypt data. This means that the same key is used by
both the sender and the recipient to encode and decode the data. Symmetric encryption is
relatively fast and efficient, but it requires that the sender and recipient share the same key
in advance, which can be a security risk.
Asymmetric encryption, also known as public key encryption, is a type of encryption that uses
two different keys to encrypt and decrypt data. One key, called the public key, is used to
encrypt the data, and the other key, called the private key, is used to decrypt it. Asymmetric
encryption is more secure than symmetric encryption because it does not require the sender
and recipient to share a key in advance. However, it is generally slower and more resource-
intensive than symmetric encryption.
Both symmetric and asymmetric encryption are important tools in the field of computer
security and are used to protect a wide range of data, including financial transactions, login
credentials, and other sensitive information.
113
• Improved data management: By categorizing information, organizations can more
easily manage and organize their data, making it easier to find and access when
needed.
• Enhanced security awareness: By educating employees about information
classification and labeling, organizations can help to improve security awareness and
encourage employees to handle sensitive information responsibly.
Data Governance
Data governance is the process of establishing and maintaining policies and procedures for
managing, storing, and using data within an organization. It involves ensuring that data is used
in an appropriate and ethical manner, and that it is protected from unauthorized access or
misuse.
• Defining roles and responsibilities: This involves establishing who is responsible for
managing and using data within the organization, as well as defining their roles and
responsibilities.
• Setting policies and standards: This involves establishing policies and standards for
managing data, such as how data should be collected, stored, and used, and how data
security should be maintained.
• Implementing processes and controls: This involves implementing processes and
controls to ensure that data is managed and used in accordance with the policies and
standards that have been established.
• Monitoring and enforcing compliance: These involve monitoring data usage to ensure
that it is following the policies and standards that have been established and acting if
necessary to address any non-compliance.
Overall, data governance involves establishing and maintaining policies and procedures for
managing, storing, and using data within an organization, in order to ensure that data is used
114
in an appropriate and ethical manner, and that it is protected from unauthorized access or
misuse.
GDPR
The General Data Protection Regulation (GDPR) is a set of EU regulations that apply to the
collection, use, and storage of personal data. It sets out a number of principles that
organizations must follow when handling personal data. These principles are:
Overall, the principles of GDPR are designed to ensure that personal data is collected and
processed in a way that respects the rights of individuals and protects their privacy.
CCPA
The California Consumer Privacy Act (CCPA) is a privacy law that applies to the collection, use,
and storage of personal information by businesses operating in California. It sets out a number
of principles that businesses must follow when handling personal information. These
principles are:
115
1. Transparency: Businesses must be transparent about how they collect, use, and share
personal information.
2. Notice: Businesses must provide notice to consumers about their data collection and
use practices and must obtain affirmative consent before collecting sensitive personal
information.
3. Access: Consumers have the right to access and request the deletion of their personal
information, as well as the right to opt out of the sale of their personal information.
4. Security: Businesses must implement and maintain reasonable security measures to
protect personal information from unauthorized access or misuse.
5. Non-discrimination: Businesses may not discriminate against consumers for
exercising their rights under the CCPA, such as by denying them goods or services,
charging them different prices, or providing them with a lower quality of goods or
services.
Overall, the principles of the CCPA are designed to give consumers greater control over their
personal information and to ensure that businesses are transparent about their data
collection and use practices.
• Standard Contractual Clauses (SCCs): SCCs are standardized contracts that outline the
rights and obligations of the parties involved in the data transfer. They are designed
to ensure that personal data is protected to the same standards as it would be within
the EU.
• Privacy Shield*: The EU-US Privacy Shield is a framework that allows companies to
self-certify that they adhere to a set of privacy principles when transferring personal
data from the EU to the US.
• Binding Corporate Rules (BCRs): BCRs are internal policies that organizations can
adopt to ensure that personal data is protected to the same standards as it would be
within the EU when transferred between different parts of the organization.
116
• Ad hoc contracts: Organizations can also enter into ad hoc contracts with specific data
controllers or processors to govern the transfer of personal data between the EU and
the US.
Overall, these mechanisms provide a way for organizations to transfer data between the EU
and the US in a way that complies with EU data protection laws. It is important for
organizations to carefully consider which mechanism is most appropriate for their specific
circumstances.
The EU-US Privacy Shield Framework is similar to the Privacy Shield in that it allows companies
to self-certify that they adhere to a set of privacy principles when transferring personal data
from the EU to the US. However, it also includes additional safeguards to ensure that personal
data is protected to the same standards as it would be within the EU.
Overall, the EU-US Privacy Shield Framework provides a way for companies to transfer
personal data from the EU to the US in a way that complies with EU data protection laws. It is
important for organizations to carefully consider which mechanism is most appropriate for
their specific circumstances.
117
CHAPTER 10
CLOUD SECURITY
118
Cloud Security
Cloud security refers to the measures taken to protect data and systems that are hosted on
the cloud. The cloud is a network of remote servers that are used to store, process, and
manage data and applications over the internet, rather than on a local server or personal
computer.
There are several key aspects to consider when it comes to cloud security:
• Data security: Data security in the cloud refers to the measures taken to protect the
data that is stored on the cloud from unauthorized access, tampering, or loss. This
may include measures such as encryption, access controls, and data backup and
recovery systems.
• Network security: Network security in the cloud refers to the measures taken to
protect the network infrastructure that is used to access and manage cloud-based
resources. This may include measures such as firewalls, virtual private networks
(VPNs), and intrusion prevention systems (IPS).
• Compliance: Organizations may be required to meet certain regulatory and
compliance standards when it comes to storing and processing data in the cloud. It is
important to ensure that the cloud provider meets these standards and has
appropriate controls in place to protect sensitive data.
By implementing appropriate security measures, organizations can protect their data and
systems when using the cloud and ensure that they remain compliant with relevant
regulations and standards.
Public cloud refers to a cloud computing model in which resources, such as computing power,
storage, and networking, are provided by a third-party provider over the internet. Public
clouds are typically owned and operated by large companies, such as Amazon Web Services
(AWS), Microsoft Azure, or Google Cloud, and are available to customers on a pay-as-you-go
basis. Public clouds offer a high degree of scalability and flexibility, as well as the ability to
quickly deploy and scale resources as needed.
119