Which of the following is the FIRST step in protecting data's confidentiality?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
In order to protect the confidentiality of the data.
The following answers are incorrect because : Install a firewall is incorrect as this would come after the information has been identified for sensitivity levels.
Implement encryption is also incorrect as this is one of the mechanisms to protect the data once it has been identified.
Review all user access rights is also incorrect as this is also a protection mechanism for the identified information.
Reference : Shon Harris AIO v3 , Chapter-4 : Access Control , Page : 126
The correct answer is C: Identify which information is sensitive.
Confidentiality is one of the three primary goals of information security, alongside integrity and availability. It refers to the protection of data from unauthorized disclosure, meaning that only authorized individuals or entities should be able to access the information.
In order to protect data's confidentiality, it is essential to first identify which information is sensitive and requires protection. This involves conducting a risk assessment to identify the potential threats and vulnerabilities to the data, as well as the potential impact of a breach of confidentiality.
Once sensitive data has been identified, appropriate security measures can be implemented to protect it. Encryption, as mentioned in option B, can be a useful tool for protecting the confidentiality of data, but it is not the first step in the process. Encryption is only effective if it is used on the right data, and if the keys used for encryption and decryption are themselves protected.
Firewalls, as mentioned in option A, are a critical security control for protecting networks, but they are not directly related to protecting data confidentiality. Firewalls control access to and from the network, but they do not provide any protection for data that has already been accessed.
Reviewing user access rights, as mentioned in option D, is an important security measure to ensure that only authorized individuals have access to sensitive data. However, this is not the first step in protecting data confidentiality. It is only effective once the sensitive data has been identified and appropriate security measures have been implemented.
In summary, the first step in protecting data confidentiality is to identify which information is sensitive and requires protection. This is done through a risk assessment, which helps to identify potential threats and vulnerabilities to the data. Once sensitive data has been identified, appropriate security measures can be implemented to protect it.