Set 16 Privacy and Software Development

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key privacy, security, and software development terms from Pages 1 and 2 notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Transient Storage

Short-term data storage (e.g., session cookies) that is deleted when the browser closes.

2
New cards

Transmission Control Protocol (TCP)

A core protocol that enables reliable data exchange between devices over a network.

3
New cards

Transport Layer Security (TLS)

An encryption protocol that secures client–server communications.

4
New cards

Trojan Horse

Malware disguised as legitimate software to deceive users.

5
New cards

Unified Modeling Language (UML)

A standard notation for describing and modeling system design elements.

6
New cards

Uniform Resource Locator (URL)

Web address identifying the location of content (e.g., https://iapp.org).

7
New cards

Use Limitation

Principle restricting data use to specified purposes or with consent.

8
New cards

User Stories

Agile artifacts describing user needs and system interactions.

9
New cards

Value-Added Services

Services beyond basic telecom offerings (e.g., SMS, MMS, premium content).

10
New cards

Virtual Private Network (VPN)

A secure, encrypted remote access network over public infrastructure.

11
New cards

Voice over Internet Protocol (VoIP)

Technology enabling voice calls over the Internet.

12
New cards

Web Beacon

Invisible tracking pixel used to determine when a web page or email is viewed.

13
New cards

Whaling

Phishing targeted at executives or other high-profile individuals.

14
New cards

Wide Area Network (WAN)

A large-scale network spanning broad geographic areas.

15
New cards

Worm

Self-replicating malware that spreads across networks.

16
New cards

Application Preference Exchange Language (APPEL)

Language for expressing user privacy preferences in browsers; not widely adopted.

17
New cards

Enterprise Privacy Authorization Language (EPAL)

Proposed language describing access rights for privacy purposes.

18
New cards

Security Assertion Markup Language (SAML)

XML-based framework for exchanging authentication and authorization data.

19
New cards

XACML

Extensible Access Control Markup Language; XML-based standard for defining access control policies.

20
New cards

Mistakes Organizations Make

Common problems in security programs: insufficient policies, poor training, disjointed practices, complacency, and weak contracts.

21
New cards

Client-Side Risks

Threats from employee devices, including theft, viruses, and lax access controls.

22
New cards

Server-Side Risks

Threats from server vulnerabilities or misconfigurations leading to data exposure.

23
New cards

Inclusions in Security Policy

Typical policy components such as encryption, software protection, auditing, and access controls.

24
New cards

Client-Side Privacy Risk

Risks from employees storing sensitive data on work computers, increasing exposure.

25
New cards

Network Sniffer

Tool to capture data packets; encryption (notably for VoIP) mitigates this risk.

26
New cards

Cryptographic Toolkit (NIST)

Framework to guide the selection of appropriate encryption standards.

27
New cards

Types of Authentication

What you know (password); What you have (token); What you are (biometrics); Where you are (location).

28
New cards

Multifactor Authentication

Using more than one type of authentication to validate identity.