Data in Use
Data in Use: Refers to data that is currently being processed or manipulated by a computer application or user. Unlike data at rest or data in transit, it’s in an active state, making it potentially more vulnerable to unauthorized access or attacks, like memory scraping. Security measures for data in use include encryption and access […]
Data Security Lifecycle (CSUSAD)
Data Security Lifecycle (CSUSAD): A framework used to ensure the protection of data throughout its entire lifecycle, from creation to destruction. The stages typically include Create, Store, Use, Share, Archive, and Destroy. Each stage is governed by security controls to ensure data confidentiality, integrity, and availability. Organizations apply these security measures to mitigate risks associated […]
Data Integrity
Data Integrity: A key principle in data security that ensures data is accurate, consistent, and reliable over its entire lifecycle. It involves maintaining the consistency, accuracy, and trustworthiness of data from the moment it is created until the point it is deleted. Measures to ensure data integrity include error checking and validation, backup, security access […]
Data Security
Data Security: The practice of protecting digital data from unauthorized access, corruption, or theft throughout its entire lifecycle. It includes a set of standards and technologies that protect data from intentional or accidental destruction, modification, or disclosure. Data security involves a range of tactics, such as encryption, tokenization, and key management practices that protect data […]
Data Control Language (DCL)
Data Control Language (DCL): A type of syntax used in SQL databases that manages permissions on different database objects. DCL commands such as GRANT and REVOKE allow specific roles or users to access or restrict certain actions on the database, ensuring that only authorized individuals have the right level of access to perform their duties.
Data Destruction
Data Destruction: The process of eliminating or erasing data from a storage medium, making it completely unreadable and non-recoverable. Methods include physical destruction, degaussing, and software-based overwriting or encryption, all aimed at preventing unauthorized individuals from retrieving and exploiting sensitive information.