chapter fifteen

15 Data Security

 

This chapter covers

  • Encryption (symmetric/asymmetric) and hashing
  • Public Key Infrastructure (PKI)
  • Data states and lifecycle
  • Data handling practices
  • Logging and monitoring security events

Previous chapters have emphasized the protection of data assets, through access control, by protecting the network and where the data is stored, or even by deploying backups that mitigate the risk of destruction. We will now study the concepts of data encryption that prevent unauthorized data access, modification, or disclosure.

Cryptographic techniques ensure protection for data during transmission, storage, or manipulation. Data may exist in distinct states: data at rest, data in transit, and data in use, each presenting unique challenges that require tailored security measures.

Any cybersecurity professional must understand the foundations of symmetric and asymmetric encryption methods, and the significance of hashing and digital signatures in relation to ensuring data integrity and authenticity.

This chapter also explains how cryptographic mechanisms participate in guaranteeing desirable properties during the stages of the data life-cycle which include creation, storage, sharing, and destruction. Finally, we address the critical role of logging and monitoring in identifying and mitigating potential security incidents.

15.1 Cryptography

15.1.1 Symmetric Encryption

15.1.2 Asymmetric Encryption

15.1.3 Comparing Symmetric with Asymmetric Encryption

15.1.4 Hashing

15.1.5 Digital Signatures

15.1.6 Public Key Infrastructure (PKI)

15.2 Data Handling

15.2.1 States of Data

15.2.2 Data Lifecycle

15.2.3 Data Classification

15.2.4 Data Labelling

15.2.5 Data Retention

15.2.6 Data Destruction

15.2.7 Data Exfiltration Prevention

15.2.8 Data Loss Prevention

15.3 Closing thoughts

15.4 Summary

15.5 Review Questions

15.6 Answer to Review Questions