Confidentiality and Privacy Controls Overview

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Identify & Classify Information

Where is it located and who has access? Value to the organization?

2
New cards

Encryption

Protect information in transit and in storage. Does not protect during data processing.

3
New cards

Access Controls

Information rights management (IRM), Data loss prevention (DLP), Digital watermarks

4
New cards

Information Rights Management (IRM)

Software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document

5
New cards

Data loss prevention (DLP)

Procedure to filter outgoing traffic to prevent confidential information from leaving

6
New cards

Digital watermarks

Code embedded in documents that enables an organization to identify confidential information that has been disclosed.

7
New cards

Training

Most important control given critical role of employee attitudes and behaviors.

8
New cards

Spam

Unsolicited e-mail that contains either advertising or offensive content.

9
New cards

CAN-SPAM Act

Requires commercial email solicitations to meet certain requirements and provides criminal and civil penalties for violations.

10
New cards

Identity theft

Unauthorized use of someone's personal information, usually financial gain.

11
New cards

General Accepted Privacy Principles (GAPP)

A framework designed to guide organizations in managing personal information and ensuring privacy. It consists of principles intended to foster transparency, accountability, and responsible data handling.

1.      Management

a.      Procedures and policies with assigned responsibility and accountability

2.      Notice

a.      Provide notice of privacy policies and practices prior to collecting data

3.      Choice and consent

a.      Opt-in versus opt-out approaches

4.      Collection

a.      Only collect needed information

5.      Use, retention, and disposal

a.      Use information only for stated business purpose. When no longer useful, dispose in a secure manner

6.      Access

a.      Customer should be able to review, correct, or delete information collected on them

7.      Disclosure to third parties

8.      Security

a.      Protect from loss or unauthorized access

9.      Quality

10. Monitoring and enforcement

a.      Procedures in responding to complaints

b.      Compliance

12
New cards

Encryption

The process of transforming normal content (plaintext) into unreadable form (ciphertext).

13
New cards

Preventive control

Protects data during transmission and storage, but not during processing.

14
New cards

Factors that influence encryption strength

Key length (longer = stronger), algorithm used, management of cryptographic keys.

15
New cards

Symmetric encryption

Uses one key to encrypt and decrypt. Both parties need to know the key.

16
New cards

Asymmetric encryption

Encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt

17
New cards

Digital signatures

A hash encrypted with the creator’s private key

18
New cards

Hashing

Process that transforms a document or file into a fixed length string of data

19
New cards

Nonrepudiation

Creating legally binding agreements that cannot be unilaterally repudiated by either party.

20
New cards

Virtual Private Network (VPN)

Securely transmits encrypted data between sender and receiver.

21
New cards

Digital certificate

Used to store an entity’s public key, often found on web sites

22
New cards

Data masking

Replacing real data with fake data

23
New cards

Blockchain

Distributed ledger of hashed documents

24
New cards

ciphertext

Document or file that must be decrypted to be read

25
New cards

Certificate authority

Company that issues pairs of public and private keys and verifies the identity of the owner of those keys

26
New cards

Key escrow

Copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable

27
New cards

Nonce

Random number used to validate a new block in a blockchain

28
New cards

Hash

plaintext transformed into short code