Cybersecurity Studies-2 (Data Security)

İrem Çıngı
3 min readNov 30, 2023

--

InfoSec Domains Part 1 — Data Security

Previous Article: Cybersecurity Studies — 1 (CIA Triad)

INFOSEC DOMAINS

1. Data Security

It is the act of protecting valuable information, or data, from unauthorized access, manipulation, and theft. The goal of data security is to ensure the confidentiality, integrity, and availability of data, whether it’s stored, processed, or transmitted within an organization’s systems.

# Confidentiality:

  • Encryption
  • Access Controls

# Integrity:

  • Data Validation
  • Hash Functions

# Availability:

  • Backup and Redundancy
  • Distributed Systems

# Data Classification:

  • Identifying Sensitivity: Classifying data based on its sensitivity and importance. This helps organizations prioritize security measures and allocate resources effectively. (like confidential, secret, or top secret)
  • Data Handling Procedures: Implementing specific handling procedures based on data classification. For example, sensitive data may require additional layers of protection.
Data Classification ⁷

# Data Masking and Anonymization:

  • Data Masking: Partially or fully obscuring specific data elements to protect sensitive information while maintaining usability for authorized users.
  • Anonymization: Removing or altering personally identifiable information (PII) to ensure that individuals cannot be identified.

# Data Lifecycle Management:

  • Data Retention Policies: Establishing policies for how long data should be retained based on regulatory requirements and business needs. This includes secure data deletion when it is no longer needed.
  • Archiving: Moving older or less frequently accessed data to secure archives, freeing up primary storage while maintaining accessibility.

# Data Security Policies and Training:

  • Policy Development: Creating and implementing data security policies that outline acceptable use, access controls, encryption standards, and other relevant guidelines.
  • Employee Training: Providing ongoing training and awareness programs to educate employees about data security best practices, social engineering threats, and the importance of safeguarding sensitive information.

# Regulatory Compliance:

  • Compliance Standards: Adhering to industry-specific regulations and compliance standards, such as GDPR, HIPAA, PCI DSS, or others, depending on the nature of the organization and the type of data it handles.

# Incident Response:

  • Data Breach Response Plans: Developing and regularly testing incident response plans to effectively and promptly respond to data breaches. This includes identifying and containing the incident, notifying affected parties, and conducting post-incident analysis.
Incident Triage Matrix ⁸

# Continuous Monitoring and Auditing:

  • Security Monitoring: Implements systems and processes to continuously monitor for unauthorized access or unusual activities.
  • Regular Audits: Conduct regular security audits to assess the effectiveness of data security controls, and identify areas for improvement.

# DLP — Data Loss Prevention

# Data Inventory

Enjoyed this post? If yes, please show some appreciation by clicking on the “clap” button. Fun trivia — you can hit it up to 50 times! It helps the content reach out to more like-minded people.

Please share your thoughts and feedback in the comments below. This will help me improve and also inspire me to create more.

I try to publish regularly on Medium. Follow this account to receive similar content in future, and click here to get each post directly in your email. You can find me on Linkedin and Github as well.

--

--