INFOASSURANCE_PRELIM-FINALS

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/118

flashcard set

Earn XP

Description and Tags

ALL HANDOUT REVIEWER/

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

119 Terms

1
New cards

Personal Data

Any information, whether recorded in a material form or not, which itentify of an individual

2
New cards

Privacy

Collection and use of data about individuals

3
New cards

Accuracy, Porperty, and Access

This is the 3 primary privacy issues.

4
New cards

Data Security

A set of standards and different safeguards and measures that an organization is taking to prevent any third party.

5
New cards

Data Breach

An unauthorized or unintentional disclosure of confidential information

6
New cards

Cyberattack

Stealing of data or confidential information by electronic means, including ransomware and hacking.

7
New cards

Data Privacy

Is a part of the data protection area that deals with the proper handling of data with the focus on compliance with data protection regulations.

8
New cards

CIA Triad

Is a model designed to guide an organization’s policies on information security.

9
New cards

Confidentiality

Ensures that data is accesses only by authorized individuals.

10
New cards

Integrity

Ensures that information is reliable as well as accurate.

11
New cards

Availability

Ensures that data is both available and accessible to satistfy business needs.

12
New cards

Internet Privacy

All personal data shared over the internet is subject to privacy issues.

13
New cards

Financial Privacy

Financial information is partifcularly sensitive, as it may easily use to commit online and/or offline fraud.

14
New cards

Medica Privacy

All medical records are subject to stringent laws that address user access privileges. By law, security and authentication system.

15
New cards

Data Management

Process of ingesting, storing, organizing, and maintaining the data created and collected by an organization. Also the heart of privacy.

16
New cards

Personally Identifiable information

Information that can be used to distinguish or trace an individuals identity.

17
New cards

Privacy by design

Take privacy requirements into acoount throughout the system development process.

18
New cards

Privacy Requirements

These are system requirements that have privacy relevance. System Privacy Requirements define the protection capabilities provided by the system.

19
New cards

Proactive, not reactive; preventive, not remedial

an approach that anticipates privacy issues and seeks to prevent problems before they arise.

20
New cards

Privacy as the default

This principle requires an organization to ensure that it only processes the data that is necessary to achieve it specific purpose.

21
New cards

Privacy embedded into the design

Privacy protections should be core, organic functions, not added on after a design is complete.

22
New cards

Full functionality: positive-sum, not zero-sum

Designers should seek solutions that avoid requiring a trade-off between privacy and sytem functionality or between privacy and security.

23
New cards

End-to-end security-life cycle protection

This principle encompasses two concepts. The term End-to-end and life cycle refer to protection of PII

24
New cards

Visibility and transparency

PbD seeks to assure users and other stakeholders that privacy-related business practices and technical controls are operating according to state commitments and objectives.

25
New cards

Respect for user privacy

The organization must view privacy as primarily being characterized by personal control and free choice.

26
New cards

Security Controls

Safeguards or countermeasures prescribed for an information system or an organization that are designed to protect the confidentiality, integrity, and availability of its information.

27
New cards

Individual privacy

Cannot be achieved solely through securing personally identifiable information.

28
New cards

Privacy Controls

Technical, physical, and administrative measures employed within an organization to satisfy privacy requirements.

29
New cards

Privacy Engineering

Involves taking account of privacy during the entire life cycle of ICT

30
New cards

Security Risk Assessment

Expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

31
New cards

Risk Management

Includes a disciplined, structured, and flexible process for organizational asset valuation;

32
New cards

Privacy Requirements

Is a system requirements that have privacy relevance. System privacy requirements define the protection capabilities provided by the system.

33
New cards

Privacy Impact Assessment

Is an analysis of how information is handled: to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy.

34
New cards

Privacy Engineering and security objectives

It focuses on the types of capabilities the system needs to demonstrate the implementation of an organization privacy policies and system privacy requirements.

35
New cards

Manageability

Providing the capability for granular administration of PII, including alteration deletion, and selective disclosure.

36
New cards

Disassociability

Enabling the processing of PII or events without association to individuals or devices beyond the operational requirements of the system.

37
New cards

Predictability

Enabling reliable assumptions by individuals, owners, and operators about PII and its processing by an information system.

38
New cards

Security Objectives

Goals and constraints that affect the confidentiality, integretiy, and availability of your data and application.

39
New cards

Confidentiality

Also known as data confidentiality, this property means that information is not made available or disclosed to unauthorized individuals, entities, or processes.

40
New cards

Data Integrity

Ensures that data and programs are changed only in a specified and authorized manner.

41
New cards

System integrity

ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

42
New cards

Avialabiltity

Ensures that systems work promptly and the service is not denied to authorized users.

43
New cards

Authenticity

The property of being genuine and being able to be verified and trusted;

44
New cards

Accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity.

45
New cards

Open Systems Interconnection

General security architecture that is useful to managers as a way of organizing the task of providing security.

46
New cards

Security attacks

are any action that compromises the security of information owned by an organization.

47
New cards

Traffic analysis

an attacker monitors communication channels to collect a range of information, including human and machine identities.

48
New cards

Security Mechanisms

Are technical tools and techniques that are used to implement security services.

49
New cards

Security service

A processing or communication service that enchances the security of the data processing system.

50
New cards

Passive attacks

are like eavesdropping or monitoring transmissions. Very difficult to detect because they do not involve any alteration of the data.

51
New cards

Release of message contents

this type an attacker will monitor an unprotected communication medium like accounts.

52
New cards

Denial-of-service attack

prevents or inhibits the normal use or management of communication facilities. Such an attack may have specific target;

53
New cards

Active attacks

Involve some modification of stored or transmitted data or the creation of false data.

54
New cards

Masquerade

Takes place when one entity pretends to be a different entity.

55
New cards

Replay

Involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

56
New cards

Data modification

simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effect.

57
New cards

Access Control

The ability to limit and control access to host systems and application via communication links

58
New cards

Data Confidentiality

Protection of transmitted data from passive attacks. Concerning the content of data transmission.

59
New cards

Data integrity

Ensures that messages are received as sent, with no duplication, insertion, modification, reordering or replays.

60
New cards

Availability Service

Means that a system or a system resource is accessible and usable upon demand by an authorized system entity.

61
New cards

Authentication

Service is concerned with ensuring that communication is authentic.

62
New cards

Online Privacy

Refers to privacy concerns related to user interaction with internet services through web servers and mobile apps.

63
New cards

Data collectors

collect information directly from their customers, audience, or other types of users of their services.

64
New cards

Data brokers

Compile large amounts of personal data from several data collectors and other data brokers without having direct online contact.

65
New cards

Data users

Category encompasses a broad range. One type of data user is a business.

66
New cards

WWW

Fundamentally a client/server application running over the internet.

67
New cards

Web server security and privacy

Concerned with the vulnerabilities and threats associated with the platform that hosts a website.

68
New cards

Web application security and privacy

Concerned with web software, including any application accessible via Web

69
New cards

Web browser security and privacy

Concerned with the browser used from a client system to access a web server.

70
New cards

Mobile Ecosystem

The execution of mobile application on a mobile device may involve communication across several networks.

71
New cards

Cellular and Wi-Fi infrastructure

Modern mobile devices are typically equipped with the capability to use cellular and WI-FI networks to access the internet.

72
New cards

Public application store

Public app stores include native app stores; these are digital distribution of services operated and developed by mobile OS Vendors.

73
New cards

Device and OS vendor infrastructure

Mobile device and OS vendors host server to provide updates and patches to the OS and apps.

74
New cards

Enterprise mobility management systems

is a general term that refers to everything involed in managing mobile devices and related components.

75
New cards

Administrator

A member of the organization who is responsible for deploying, maintaining, and securing the organization mobile deivces.

76
New cards

App testing facility

administrator submits the app to an app testing facility in the organization that employs automated or human analyzer.

77
New cards

Auditor

Is to inspect reports and risk assessments from one or more analyzers. Then makes a recommendation to someone in the organization.

78
New cards

Web application privacy

Open web application security project top 10 privacy risks project

79
New cards

Web application vulnerabilities

failing to suitable design and implement an application, detect a problem, or promptly apply a fix.

80
New cards

User-side data leakage

Failing to prevent the leakage of any information containing or related to user data, or the data itself.

81
New cards

Insufficient data breach response

Not informing the affected persons about a possible breach or data leak.

82
New cards

Insufficient deletion of personal data

Failing to delete personal data effectively or a timely fashion

83
New cards

Non-transparent policies, terms, and conditions

Not providing sufficient information describing how data are processes

84
New cards

Collection of data not required for the primary purpose

Collecting descriptive, demographic, or any other user-related data

85
New cards

Sharing of data with third party

providing user data to a third party without obtaining the user’s consent.

86
New cards

Outdated personal data

Using outdated, incorrect, or bogus user data and failing to update or correct the data.

87
New cards

Missing or insufficient session expiration

Failing to effectively enforce session termination.

88
New cards

Insecure data transfer

Failing to provide data transfers over encrypted and secured channels.

89
New cards

Insecure network communcations

Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping.

90
New cards

Web Browser vulnerabilities

Adversaries can exploit vulnerabilities in mobile device web browser

91
New cards

Vulnerabilities in third-party libraries

Third-party software libraries are reusable components that may be distributed freely or offered for a fee.

92
New cards

Risk Assessment

To enable organization executives to determine an appropriate budget for security. Also to estimate of the potential cost.

93
New cards

Threat

Circumstance or event with the potential to adversely impact organizational operations.

94
New cards

Threat Severity

The magnitude of the potential of a threat event to impose a cost on a organization.

95
New cards

Threat Strength

Referred to as threat capability, the probable level of force that a threat agent can apply against an asset.

96
New cards

Threat event frequency

The probable frequency, within a given time frame, that a threat agent will act against an asset.

97
New cards

Vulnerability

Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggerd by a threat soruce.

98
New cards

Impact

The magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information.

99
New cards

Likelihood

Called loss event frequency, the probable frequency.

100
New cards

Risk

Extent to which an entity is threatened by a potential circumstance or event.