InfoAssurance_L4_Midterm

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

39 Terms

1
New cards

Online privacy

refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps.

2
New cards

Data collectors

collect information directly from their customers, audience, or other types of users of their services.

3
New cards

Data brokers

compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.

4
New cards

Data brokers

repackage and sell the collected information to various data users, typically without the permission or input of the individuals involved.

5
New cards

Data users

category encompasses a broad range. One type of data user is a business that wants to target its advertisements and special offers.

6
New cards

Web server security and privacy

are concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.

7
New cards

Web application security and privacy

are concerned with web software, including any applications accessible via the Web.

8
New cards

Web browser security and privacy

are concerned with the browser used from a client system to access a web server.

9
New cards

Cellular and Wi-Fi infrastructure

Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls. Cellular network cores also rely upon authentication servers to use and store customer authentication information.

10
New cards

Public application stores (public app stores)

these are digital distribution services operated and developed by mobile OS vendors.

11
New cards

Google Play

For Android, the official app store is ______

12
New cards

App Store

For iOS, it is simply called the ________.

13
New cards

Device and OS vendor infrastructure

Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device.

14
New cards

Enterprise mobility management systems

is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).

15
New cards

Enterprise mobility management systems

is much broader than just information security; it includes mobile application management, inventory management, and cost management.

16
New cards

Administrator

is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices as well as ensuring that deployed devices and their installed apps conform to the organization’s security requirements.

17
New cards

App testing facility

The administrator submits the app to an ________________ in the organization that employs automated and/or human analyzers to evaluate the security characteristics of an app, including searching for malware, identifying vulnerabilities, and assessing risks.

18
New cards

Threats from Application

The first step in developing privacy by design and privacy engineering solutions for online privacy is to define the threats to online privacy.

19
New cards

Web application privacy

The Open Web Application Security Project (OWASP) top 10 privacy risks project provides a list of the top privacy risks in web applications.

20
New cards

Web application vulnerabilities

Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach

21
New cards

User-side data leakage

Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality.

22
New cards

User-side data leakage

Leakage may be introduced due to either intentional malicious breach or mistake (e.g., caused by insufficient access management controls, insecure storage, duplication of data, or a lack of awareness).

23
New cards

Insufficient data breach response

Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.

24
New cards

Insufficient deletion of personal data

Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.

25
New cards

Non-transparent policies, terms, and conditions

Not providing sufficient information describing how data are processed, such as their collection, storage, and processing.

26
New cards

Non-transparent policies, terms, and conditions

Failure to make this information easily accessible and understandable for non-lawyers.

27
New cards

Collection of data not required for the primary purpose

Collecting descriptive, demographic, or any other user-related data that are not needed for the system.

28
New cards

Collection of data not required for the primary purpose

This applies also to data for which the user did not provide consent.

29
New cards

Sharing of data with a third party

Providing user data to a third party without obtaining the user’s consent.

30
New cards

Sharing of data with a third party

Sharing results either due to transfer or exchanging for monetary compensation or otherwise due to inappropriate use of third-party resources included in websites, such as widgets (e.g., maps, social networking buttons), analytics, or web bugs.

31
New cards

Outdated personal data

Using outdated, incorrect, or bogus user data and failing to update or correct the data.

32
New cards

Missing or insufficient session expiration

Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness.

33
New cards

Insecure data transfer

Failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage.

34
New cards

Insecure data transfer

Failing to enforce mechanisms that limit the leaking surface (e.g., allowing to infer any user data out of the mechanics of web application operation).

35
New cards

Mobile app privacy

Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system.

36
New cards

Insecure network communications

Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping.

37
New cards

Web browser vulnerabilities

Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.

38
New cards

Vulnerabilities in third-party libraries

Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors.

39
New cards

Vulnerabilities in third-party libraries

Software development by component or modules may be more efficient, and third-party libraries are routinely used across the industry.