Sy0-701 - Lesson 16
Sy0-701 - Lesson 16
Lesson 16
Summarize Data Protection and
Compliance Concepts
Topic 16A
Data Classification and Compliance
• Regulated Data
• Trade Secrets
• Intellectual Property
• Legal and Financial Data
• Many Others
3
Data Classifications
4
Data Sovereignty and Geographical Considerations
Data Sovereignty
A legal jurisdiction restricting processing and storage of data on systems
that do not physically reside within that jurisdiction
Geographical Considerations
Organizations must ensure data remains within a designated boundary
Access controls to validate a user's geographic location
5
Privacy Data
• Personally identifiable or sensitive information associated with an individual's
personal, financial, or social identity
• Data that could infringe upon an individual's privacy rights, if exposed or mishandled
• Data protection and privacy laws safeguard both data types
• Rapidly evolving legal environment
• Privacy data is closely associated with the rights of individuals to control the use and
disclosure of their personal information
• Individuals have the right to access, correct, and request the deletion of their privacy
data
6
Privacy Data
Legal Implications
• Protecting privacy data carries significant local, national, and global legal implications
• Many countries have specific privacy laws and regulations that dictate how personal
data should be handled within their jurisdiction
• The General Data Protection Regulation (GDPR) in the European Union has had a
substantial impact globally by setting high privacy and data protection standards.
• GDPR applies to organizations that process the personal data of EU residents,
regardless of their physical location.
8
Privacy Breaches and Data Breaches
When information is read, modified, or deleted without authorization
Organizational Consequences
• Reputation damage
• Identity theft
• Fines
• Intellectual Property (IP) theft
Breach Notification
• Requirements for different types of breach are established in laws and in regulations
• Public Notification and Disclosure
9
Compliance
Security compliance refers to organizations' adherence to applicable security standards,
regulations, policy and best practices
Compliance Issues
• Legal & Regulatory Noncompliance
• Software Licensing
• Contractual Noncompliance
10
Monitoring and Reporting
Systematically assessing, evaluating, and reporting an organization's adherence to laws,
regulations, contracts, and industry standards
• Internal and External Compliance Reporting
• Compliance Monitoring
11
Data Protection and Data Loss Prevention
12
Review Activity: Data Classification and Compliance
• Data Types
• Data Classifications
• Data Sovereignty and Geographical Considerations
• Privacy Data
• Privacy Breaches and Data Breaches
• Compliance
• Monitoring and Reporting
• Data Protection
• Data Loss Prevention
13
Lesson 16
Topic 16B
Personnel Policies
15
User and Role-Based Training
Untrained users represent a serious vulnerability because they are susceptible to social
engineering and malware attacks and may be careless when handling sensitive or
confidential data.
16
Training Topics and Techniques
Popular Techniques
• Computer-Based Training
• Gamification
• Phishing Campaigns
Topics
• Situational Awareness
• Reporting and Escalation Procedures
• Policy/Handbooks
• Insider Threat
• Password Management
• Removable Media and Cables
• Hybrid/Remote Work Environments
17
Security Awareness Training Lifecycle
18
Review Activity: Personnel Policies
• Conduct Policies
• User and Role-Based Training
• Training Topics and Techniques
• Security Awareness Training Lifecycle
19
Lab Activity
• Assisted Lab: Training and Awareness through Simulation
• Challenge Lab: Discovering Anomalous Behavior
20
CompTIA Security+ Exam SY0-701
Lesson 16
Summary