Menu

1.4 Given a scenario, implement data security techniques for securing enterprise architecture.

Data loss prevention

 Blocking use of external media

 Remote Desktop Protocol (RDP) blocking

 Clipboard privacy controls

 Restricted virtual desktop infrastructure (VDI) implementation

 Data classification blocking

Data loss detection

 Watermarking

 Digital rights management (DRM)

 Network traffic decryption/deep packet inspection

 Network traffic analysis

Data classification, labeling, and tagging

 Metadata/attributes

Obfuscation

 Tokenization

 Scrubbing

 Masking

Anonymization

Encrypted vs. unencrypted

Data life cycle

 Create

 Use

 Share

 Store

 Archive

 Destroy

Data inventory and mapping

Data integrity management

Data storage, backup, and recovery

 Redundant array of inexpensive disks (RAID)