ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 119 - 312-40 discussion

Report
Export

Rebecca Gibel has been working as a cloud security engineer in an IT company for the past 5 years. Her organization uses cloud-based services. Rebecca's organization contains personal information about its clients,which is encrypted and stored in the cloud environment. The CEO of her organization has asked Rebecca to delete the personal information of all clients who utilized their services between 2011 and 2015. Rebecca deleted the encryption keys that are used to encrypt the original data; this made the data unreadable and unrecoverable. Based on the given information, which deletion method was implemented by Rebecca?

A.
Data Scrubbing
Answers
A.
Data Scrubbing
B.
Nulling Out
Answers
B.
Nulling Out
C.
Data Erasure
Answers
C.
Data Erasure
D.
Crypto-Shredding
Answers
D.
Crypto-Shredding
Suggested answer: D

Explanation:

Crypto-shredding is the method of 'deleting' encrypted data by destroying the encryption keys. This method is particularly useful in cloud environments where physical destruction of storage media is not feasible. By deleting the keys used to encrypt the data, the data itself becomes inaccessible and is effectively considered deleted.

Here's how crypto-shredding works:

1.Encryption: Data is encrypted using cryptographic keys, which are essential for decrypting the data to make it readable.

1.Key Management: The keys are managed separately from the data, often in a secure key management system.

1.Deletion of Keys: When instructed to delete the data, instead of trying to erase the actual data, the encryption keys are deleted.

1.Data Inaccessibility: Without the keys, the encrypted data cannot be decrypted, rendering it unreadable and unrecoverable.

1.Compliance: This method helps organizations comply with data protection regulations that require secure deletion of personal data.

A technical paper discussing the concept of crypto-shredding as a method for secure deletion of data in cloud environments.

An industry article explaining how crypto-shredding is used to meet data privacy requirements, especially in cloud storage scenarios.

asked 18/09/2024
Antonio Pombo
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first