Set 13 Advanced Access Controls, Encryption, Privacy Concepts (Vocabulary Flashcards)

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms and definitions from Pages 1-2 notes on advanced access controls, encryption, privacy, and related concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

APPEL

A language for users to express privacy preferences in browsers; not widely adopted.

2
New cards

EPAL

IBM-developed privacy access rights language; no longer supported.

3
New cards

SAML

XML-based security framework enabling single sign-on (SSO) and cross-platform authentication.

4
New cards

XACML

XML-based policy language for access control using attributes, roles, and tokens.

5
New cards

Mistakes Organizations Make

Common issues like insufficient policies, poor training, disjointed data practices, complacency, or weak contracts.

6
New cards

Client-Side Risks

Risks from employee devices, such as viruses, data theft, or weak access controls.

7
New cards

Server-Side Risks

Risks on organizational servers, including vulnerabilities, viruses, and traffic overloads.

8
New cards

Security Policy Inclusions

Typical contents include encryption, software protection, access controls, physical protections, auditing.

9
New cards

Client-Side Privacy Risk

Risks from storing sensitive or personal data on employee machines.

10
New cards

Network Sniffer

Tool that intercepts network traffic; mitigated by strong encryption.

11
New cards

Cryptographic Toolkit (NIST)

NIST guidance on choosing appropriate encryption types.

12
New cards

Attribute-Based Access Control (ABAC)

Access control model extending RBAC with conditions like time, location, or age.

13
New cards

/P:count flag

Windows OS formatting option to overwrite a disk with zeros.

14
New cards

Cross-Enterprise Access Controls

Access across organizations (e.g., outsourced payroll, SaaS), often via SSO.

15
New cards

SSL Encryption

Secure Sockets Layer protocol to protect web communications.

16
New cards

TLS Encryption

Transport Layer Security; widely used for email and web communications.

17
New cards

Multilayered Privacy Notice

Shortened notice with links to full policy details.

18
New cards

Privacy Nutrition Label

Standardized, label-style privacy disclosures for easy understanding.

19
New cards

Hashing

Cryptographic method producing irreversible values to protect data.

20
New cards

Types of Authentication

What you know (password), what you have (token), what you are (biometric), where you are (location).

21
New cards

Multifactor Authentication

Using more than one type of authentication for stronger security.

22
New cards

Device Identifier

IDs like MAC addresses that can track users across systems; hard to delete.

23
New cards

Development Lifecycle

Stages: release planning, definition, development, validation, deployment.

24
New cards

Countermeasures

Preventive, reactive, detective, and administrative methods to mitigate risks.

25
New cards

Stages of PCI DSS Compliance

Steps: collecting/storing logs, reporting for audits, monitoring/alerting access/usage.

26
New cards

Re-identification

Process of identifying individuals in anonymized datasets using external data.

27
New cards

Symmetric Key Cryptography

Encryption using one shared key for both encryption and decryption.

28
New cards

Asymmetric Cryptography

Encryption using paired public/private keys for secure data sharing.

29
New cards

Cookies

Text files on a user’s device for session management, personalization, and tracking.