Information Assurance and Security (Data Privacy) Prelim Reviewer

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Personal Data

Refers to any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be directly ascertained by the entity holding the information

2
New cards

Privacy

Concerns the collection and use of data about individuals

3
New cards

Accuracy

Refers to the responsibility of those who collect data to ensure that the data is correct

4
New cards

Property

Relates to who owns the data

5
New cards

Access

Relates to the responsibility of those who have data to control who can use that data

6
New cards

Data Privacy

Is a part of the data protection area that deals with the proper handling of data, with the focus on compliance with data protection regulations.

7
New cards

Data Security

Includes a set of standards and different safeguards and measures that an organization is taking to prevent any third party from unauthorized access to digital data or any intentional or unintentional alteration, deletion, or data disclosure

8
New cards

Data Breach

An unauthorized or unintentional disclosure of confidential information

9
New cards

Cyberattack

The stealing of data or confidential information by electronic means, including ransomware and hacking

10
New cards

CIA Triad

Is a model designed to guide an organization’s policies on information security

11
New cards

Confidentiality

Ensures that data is accessed only be authorized individuals

12
New cards

Integrity

Ensures that information is reliable as well as accurate

13
New cards

Availability

Ensures that data is both available and accessible to satisfy business needs

14
New cards

Elements of Data Privacy

  • Right of an individual to be left alone and have control over their data

  • Procedures for proper handling, processing, collecting and sharing of personal data

  • Compliance with data protection laws

15
New cards

Data Management

The process of ingesting, storing, organizing, and maintaining the data created and collected by an organization

16
New cards

Information Privacy

  • Is considered an important aspect of information sharing

  • May be applied in numerous ways, including encryption, authentication, and data masking, each attempting to ensure that information is available only to those with authorized access

  • Includes regulations required for companies to protect data.

  • Geared toward preventing data mining and the unauthorized use of personal information, which are illegal in many parts of the world

17
New cards

Internet Privacy

All personal data shared over the internet is subject to privacy issues. Most websites publish a privacy policy that details the website;s intended use of collected online and/or offline collected data

18
New cards

Financial Privacy

Financial Information is particularly sensitive, as it may easily use to commit online and.or offline fraud

19
New cards

Medical Privacy

All medical records are subject to stringent laws that address user access privileges. By law, security and authentication systems are often required for individuals that process and store medical records.

20
New cards

Personally Identifiable Information

Is information that can be used to distinguish or trace an individual’s identity

21
New cards

Privacy Requirements

These are requirements that have privacy relevance. They are derived from various sources, including laws, regulations, standards, and stakeholder expectations

22
New cards

System Privacy

Define the protection capabilities provided by the system, performance and behavioral characteristics exhibited by the system, and the evidence used to determine that the system privacy requirements have been satisfied.

23
New cards

Proactive, not reactive; preventive, not remedial

Is an approach that anticipates the privacy issues and seeks to prevent problems before they arise. Designers must assess the potential vulnerabilities in a system and the types of threats that may occur and then select technical and managerial controls to protect the system

24
New cards

Privacy as the default

This principle requires an organization to ensure that it only processes the data that is necessary to achieve its specific purpose and that PII is protected during collection, storage, use, and transmission

25
New cards

Privacy embedded into the design

Privacy protections should be the core, organic functions, not added on after a design is complete. Privacy should be integral both to the design and architecture of IT systems and to business practices.

26
New cards

Full functionality: positive-sum, not zero-sum

Designers should seek solutions that avoid requiring a trade-off between privacy and system functionality or between privacy and security

27
New cards

End-to-end security-life cycle protection

This principle encompasses two concepts. It refers to the protection of PII from the time of collection through retention and destruction. During this life cycle, there should be no gaps in the protection of the data or accountability for the data. The term security highlights that security processes and controls are used to provide not just security but privacy

28
New cards

Visibility and transparency

Seeks to assure users and other stakeholders that privacy-related business practices and technical controls are operating according to state commitments and objectives

29
New cards

Respect for user privacy

The organization must view privacy as primarily being characterized by personal control and free choice

30
New cards

Privacy Risk Assessment

Is to enable organization executives to determine an appropriate budget for privacy and, within that budget, implement the privacy controls that optimize the level of protection

31
New cards

Security Controls

Are safeguards or countermeasures prescribed for an information system or an organization that are designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements

32
New cards

Privacy Controls

Are the technical, physical, and administrative measures employed within an organization to satisfy privacy requirements,

33
New cards

Privacy Engineering

  • Involves taking account of privacy during the entire life cycle of ICT

  • Focuses on implementing techniques that decrease privacy risks and enables organizations to make purposeful decisions about resource allocation and effective implementation of controls in information systems

34
New cards

Security Risk Assessment

Is an expectation of loss expressed as the probability that a particular threat will expolit a particular vulnerability with a particular harmful result

35
New cards

Risk Management

Includes a disciplined asset valuation, security and privacy control selection, implementation, and assessment system and control authorizations

36
New cards

Privacy engineering and security objectives

Focuses on the type of capabilities the system needs to demonstrate the implementation of an organization’s privacy policies and system privacy requirements