#6 Privacy Languages and Risks (Pages 1–2)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering key terms related to privacy languages, risk concepts, and security measures from Pages 1–2.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Web Beacon

A clear graphic image (typically one pixel) delivered through a browser or email that tracks visits, opens, or activity.

2
New cards

Whaling

Phishing targeted at high-profile individuals, such as executives or wealthy people.

3
New cards

WAN

A telecommunications network that spans large geographic regions for data transmission.

4
New cards

Worm

Self-replicating malicious program that spreads across networks.

5
New cards

Platform for Privacy Preference (P3P)

W3C project to standardize privacy practices in XML for websites.

6
New cards

Application Preference Exchange Language (APPEL)

Language allowing users to express privacy preferences in browsers; never widely adopted.

7
New cards

Enterprise Privacy Authorization Language (EPAL)

IBM-proposed language for privacy access rights; no longer supported.

8
New cards

Security Assertion Markup Language (SAML)

XML-based standard for exchanging authentication/authorization data; supports SSO.

9
New cards

eXtensible Access Control Language (XACML)

XML-based language applying access policies to resources via tokens and predefined roles.

10
New cards

Mistakes Organizations Make

Common privacy/security errors: weak policies, poor training, disjointed practices, complacency, weak contracts.

11
New cards

Client Side Risks

Risks from employee devices: stolen computers, viruses, poor access controls, personal data on work devices.

12
New cards

Server Side Risks

Server vulnerabilities: viruses, traffic overloads; mitigated by reducing apps, screening, retention, and de-identification.

13
New cards

Included in a Security Policy

Key elements: encryption, software protection, access controls, physical protections, social engineering defense, auditing.

14
New cards

Client Side Privacy Risk

Threats from employees storing sensitive or personal data on company machines, which can be exploited.

15
New cards

Network Sniffer

Tool intercepting network data; mitigated by strong encryption, critical for VoIP.

16
New cards

Cryptographic Toolkit (NIST)

NIST guidance to select appropriate encryption for specific needs.

17
New cards

Attribute-Based Access Control

Extension of RBAC allowing factors like time, location, or nationality.

18
New cards

/P:count flag

Windows OS command-line option used to zero an entire disk during formatting.

19
New cards

Cross-Enterprise Access Controls

Access across organizations (e.g., outsourced services, SaaS); often integrated with SSO.

20
New cards

SSL Encryption

Secure Socket Layer; protocol to protect communications between browsers and servers.

21
New cards

TLS Encryption

Transport Layer Security; modern protocol for securing communications like email and web.

22
New cards

Multilayered Privacy Notice

Abbreviated privacy notice linking to more detailed layers of information.

23
New cards

Privacy Nutrition Label

Privacy disclosure presented in a standardized, label-style format for easier comprehension.

24
New cards

Hashing

Cryptographic method protecting data by creating irreversible transformations.

25
New cards

Types of Authentication

Categories: What you know (password), What you have (token), What you are (biometrics), Where you are (location).

26
New cards

Multifactor Authentication

Combining more than one authentication type (e.g., password + biometric).

27
New cards

Device Identifier

Unique device ID (e.g., MAC address) used for tracking; often not deletable or opt-out capable.

28
New cards

Development Lifecycle

Stages: Release planning, Definition, Development, Validation, Deployment.

29
New cards

Countermeasures

Preventive, Reactive, Detective, Administrative security measures to mitigate risks.

30
New cards

Stages of PCI DSS Compliance

Collect/store logs, reporting for audits, monitoring and alerting access/usage.

31
New cards

Re-identification

Identifying individuals in anonymized datasets using auxiliary information.