Chapter 2. Examining Your Data Environment

In This Chapter

  • Discovering the types of data at risk

  • Listing the most common types of data

  • Ferreting out where your at-risk data lives

  • Finding out who we're protecting our data from

  • Understanding that this is more like an arms race than you might have thought

Many companies (and people) don't know what data they have in their environment! Part of the security process is simply identifying all the valuable information that you need to protect. This chapter covers the different types of data you need to protect — and how to identify them within your organization.

Tip

If you know exactly what data you have, you can skip to Chapter 3.

Discovering the Types of Data at Risk

The types of data are many and varied. To find a way through the maze, you can start looking at the context surrounding a body of data — what it's used for, who uses it, why it was collected, what's at stake, that sort of thing. This is an effective way to start thinking like a cyber-criminal and work out whether (as a bad guy) you could use the data — within its context.

Note

Get Data Leaks For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.