Get startedGet started for free

Similar but different

Five Digital Sentinels, join you to chat while you are resting with a snack. They tell you that they will be a crucial tool to fight the Data Bandits. By understanding their similarities and differences, you can remember them more easily.

  • Zero Trust Architecture says that trust is never assumed. All systems and users are considered untrusted until proven otherwise. The primary focus is on continuous verification and strict access controls.

  • Separation of Duties divides tasks and privileges among users to prevent conflicts of interest, fraud, or errors. The process ensures that no single individual controls a critical process from beginning to end.

  • With Principle of Least Privilege, user access rights are kept at the bare minimum necessary for their job roles. It minimizes potential security risks by allowing users to access only what they need.

  • Data Loss Prevention is a set of tools for protecting sensitive data from unauthorized access, sharing, or theft. It aims to prevent data breaches by monitoring, detecting, and blocking data leaks.

  • Role-Based Control assigns access permissions and rights based on organizational job roles. Users have permissions that align with their specific roles, helping streamline access management.

You and Data Defender identify common attributes these models share.

Select the three attributes in this list that all 5 operational models have in common.

This exercise is part of the course

Introduction to Data Security

View Course

Hands-on interactive exercise

Turn theory into action with one of our interactive exercises

Start Exercise