dat privacy midterm

0.0(0)
studied byStudied by 1 person
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

68 Terms

1
New cards

Security objectives

are goals and constraints that affect the confidentiality, integrity, and availability of your data and application

2
New cards

Confidentiality

Also known as data confidentiality

this property means that information is not made available or disclosed to unauthorized individuals, entities, or processes.

3
New cards

Data integrity

ensures that data (both stored and is transmitted packets) and programs are changed only in a specified and authorized manner.

4
New cards

A loss of confidentiality

is the unauthorized disclosure of information.

5
New cards

A loss of data integrity

is the unauthorized modification or destruction of information

6
New cards

System integrity

ensures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

7
New cards

Availability

ensures that systems work promptly and the service is not denied to authorized users.

8
New cards

A loss of availability

is the disruption of access to or use of information or an information system.

9
New cards

Authenticity:

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or a message originator. This means verifying that users are who they say they are and that each input arriving at the system came from a trusted source.

10
New cards

Accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. Because truly secure systems are not yet an achievable goal, it must be possible to trace a security breach to a responsible party. Systems must keep records of their activities to permit later forensic analysis to trace security breaches or to aid in transaction disputes

11
New cards

Accountability2

This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

12
New cards

Open Systems Interconnection (OSI)

defines a general security architecture that is useful to managers as a way of organizing the task of providing security

13
New cards

OSI

This standardized architecture defines security requirements.

14
New cards

Security attacks

are any action that compromises the security of information owned by an organization.

15
New cards

Security attack2

attempt to gain unauthorized access to information resources or services, or cause harm or damage to information systems.

16
New cards

Security mechanisms

are technical tools and techniques that are used to implement security services

process that is designed to detect, prevent, or recover from a security attack

17
New cards

Security service

is a processing or communication service that enhances the security of the data processing systems, and the information transfers of an organization.

18
New cards

Security service2

are intended to counter security attacks, and they make use of security mechanisms to provide the services.

19
New cards

 Passive attacks

are like eavesdropping or monitoring transmissions. The goal of the attacker is to obtain information that is being transmitted.

20
New cards

Release of message contents:

In this type, an attacker will monitor an unprotected communication medium like unencrypted email or telephone call and intercept it for sensitive information.

21
New cards

Traffic analysis:

In this type, an attacker monitors communication channels to collect a range of information, including human and machine identities, locations of these identities, and types of encryption used, if applicable.

22
New cards

Passive attacks2

are very difficult to detect because they do not involve any alteration of the data.

23
New cards

using strong network encryption methods.

The best way to prevent a passive attack is by

This means that the original message should be well encrypted into an unintelligible language at the sender’s end and should be decoded into an understandable language at the receiver’s end.

24
New cards

Active attacks

involve some modification of stored or transmitted data or the creation of false data

25
New cards

masquerade

takes place when one entity pretends to be a different entity.

A ——— attack usually includes one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra privileges by impersonating an entity that has those privileges.

26
New cards

Replay

involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

27
New cards

Data modification

simply means that some portion of a legitimate message is altered or that messages are delayed or reordered to produce an unauthorized effect. For example, a message stating “Allow Kit Estrada to read confidential file Accounts” might be modified to say, “Allow Fred Brown to read confidential file, Accounts.”

28
New cards

denial-of-service attack

prevents or inhibits the normal use or management of communication facilities. Such an attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service).

Another form of——  is the disruption of an entire network, either by disabling the network or by overloading it with messages to degrade performance.

29
New cards

Authentication service

is concerned with ensuring that communication is authentic. In the case of a single message, such as a warning or an alarm signal, the function of the ————- is to ensure the recipient that the message is from the source that it claims to be from.

30
New cards

Access control

is the ability to limit and control access to host systems and applications via communications links. To achieve this, each entity trying to gain access must first be identified or authenticated so that access rights can be tailored to the individual.

31
New cards

Data confidentiality

is the protection of transmitted data from passive attacks. Concerning the content of data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period. For example, when a logical network connection is set up between two systems, this broad protection prevents the release of any user data transmitted over the connection

32
New cards

Data integrity

ensures that messages are received as sent, with no duplication, insertion, modification, reordering, or replays 

33
New cards

Data integrity2

ensures that information is modified only in appropriate ways by persons authorized to change it.

34
New cards

Nonrepudiation prevents

either a sender or a receiver from denying a transmitted message. Thus, when a message is sent, the receiver can prove that the alleged sender sent the message. Similarly, when a message is received, the sender can prove that the alleged receiver received the message.

35
New cards

Availability service

means that a system or a system resource is accessible and usable upon demand by an authorized system entity, according to performance specifications for the system; that is, a system is available if it provides services according to the system design whenever users request them.

36
New cards

Online privacy

refers to privacy concerns related to user interaction with Internet services through web servers and mobile apps

37
New cards

Data collectors

collect information directly from their customers, audience, or other types of users of their services.

38
New cards

Data brokers

compile large amounts of personal data from several data collectors and other data brokers without having direct online contact with the individuals whose information is in the collected data.

39
New cards

data brokers

repackage and sell the collected information to various data users, typically without the permission or input of the individuals involved

Because consumers generally do not directly interact with data ——- , they have no means of knowing the extent and nature of the information that data brokers collect about them and share with others for their financial gain

40
New cards

Data brokersss

can collect information about consumers from various public and nonpublic sources, including courthouse records, website cookies, and loyalty card programs.

Typically, —— create profiles of individuals for marketing purposes and sell them to data users.

41
New cards

data users

category encompasses a broad range. One type of ——- is a business that wants to target its advertisements and special offers. Other uses are fraud prevention and credit risk assessment.

42
New cards

 WWW

is fundamentally a client/server application running over the Internet

The use of the Web presents several security challenges:

o The Web is vulnerable to attacks on web servers over the Internet.

o Casual and untrained (in security matters) users are common clients for web-based services. Such users are not necessarily aware of the security risks that exist and do not have the tools or knowledge to take effective countermeasures.

o A web server can be exploited as a launching pad into a corporation’s or an agency’s entire computer complex. Once a web server is subverted, an attacker may be able to gain access to data and systems not part of the Web itself but connected to the server at the local site

43
New cards

Web server security and privacy

are concerned with the vulnerabilities and threats associated with the platform that hosts a website, including the operating system (OS), file and database systems, and network traffic.

44
New cards

Web application security and privacy

are concerned with web software, including any applications accessible via the Web.

45
New cards

Web browser security and privacy

are concerned with the browser used from a client system to access a web server.

46
New cards

Cellular and Wi-Fi infrastructure:

Modern mobile devices are typically equipped with the capability to use cellular and Wi-Fi networks to access the Internet and to place telephone calls. Cellular network cores also rely upon authentication servers to use and store customer authentication information.

47
New cards

Public application stores (public app stores)

 these are digital distribution services operated and developed by mobile OS vendors. For Android, the official app store is Google Play, and for iOS, it is simply called the App Store. These stores invest considerable effort in detecting and thwarting malware and ensuring that the apps do not cause unwanted behavior on mobile devices. In addition, there are numerous third-party app stores. The danger with third-party stores is uncertainty about what level of trust the user or the enterprise should have that the apps are free of malware.

48
New cards

Device and OS vendor infrastructure:

Mobile device and OS vendors host servers to provide updates and patches to the OS and apps. Other cloud-based services may be offered, such as storing user data and wiping a missing device.

49
New cards

Enterprise mobility management systems (EMM)

is a general term that refers to everything involved in managing mobile devices and related components (e.g., wireless networks).

—- is much broader than just information security; it includes mobile application management, inventory management, and cost management. Although —— is not directly classified as a security technology, it can help in deploying policies to an enterprise’s device pool and monitoring a device’s state.

50
New cards

App Vetting Process

• The process of evaluation and approval or rejection of apps within an organization

begins when an app is acquired from a public or enterprise store or submitted by an in-house or third-party developer

51
New cards

administrator

is a member of the organization who is responsible for deploying, maintaining, and securing the organization’s mobile devices as well as ensuring that deployed devices and their installed apps conform to the organization’s security requirements.

52
New cards

app testing facility

in the organization that employs automated and/or human analyzers to evaluate the security characteristics of an app, including searching for malware, identifying vulnerabilities, and assessing risks. The resulting security report and risk assessment are conveyed to an auditor or auditors.

53
New cards

auditor

is to inspect reports and risk assessments from one or more analyzers to ensure that an app meets the security requirements of the organization.

The ——also evaluates additional criteria to determine if the app violates any organization-specific security requirements that could not be ascertained by the analyzers •

The —- then makes a recommendation to someone in the organization who has the authority to approve or reject an app for deployment on mobile devices. If the approver approves an app, the administrator can then deploy the app on the organization’s mobile devices.

54
New cards

to define the threats to online privacy

The first step in developing privacy by design and privacy engineering solutions for online privacy is

55
New cards

Web application vulnerabilities:

Failing to suitable design and implement an application, detect a problem, or promptly apply a fix (patch), which is likely to result in a privacy breach. Vulnerability is a key problem in any system that guards or operates on sensitive user data.

56
New cards

User-side data leakage:

Failing to prevent the leakage of any information containing or related to user data, or the data itself, to any unauthorized party resulting in loss of data confidentiality. Leakage may be introduced due to either intentional malicious breach or mistake (e.g., caused by insufficient access management controls, insecure storage, duplication of data, or a lack of awareness).

57
New cards

Insufficient data breach response:

Not informing the affected persons (data subjects) about a possible breach or data leak, resulting in either from intentional or unintentional events; failure to remedy the situation by fixing the cause; not attempting to limit the leaks.

58
New cards

Insufficient deletion of personal data:

Failing to delete personal data effectively and/or in a timely fashion after the termination of the specified purpose or upon request.

59
New cards

Non-transparent policies, terms, and conditions:

Not providing sufficient information describing how data are processed, such as their collection, storage, and processing. Failure to make this information easily accessible and understandable for non-lawyers.

60
New cards

Collection of data not required for the primary purpose:

Collecting descriptive, demographic, or any other user-related data that are not needed for the system. Applies also to data for which the user did not provide consent

61
New cards

Sharing of data with a third party:

Providing user data to a third party without obtaining the user’s consent. Sharing results either due to transfer or exchanging for monetary compensation or otherwise due to inappropriate use of third-party resources included in websites, such as widgets ((e.g., maps, social networking buttons), analytics, or web bugs.

62
New cards

Outdated personal data:

Using outdated, incorrect, or bogus user data and failing to update or correct the data

63
New cards

Missing or insufficient session expiration:

Failing to effectively enforce session termination. May result in the collection of additional user data without the user’s consent or awareness

64
New cards

Insecure data transfer:

failing to provide data transfers over encrypted and secured channels, excluding the possibility of data leakage. Failing to enforce mechanisms that limit the leaking surface (e.g., allowing to infer any user data out of the mechanics of web application operation).

65
New cards

Mobile app privacy:

Legitimate mobile apps may be vulnerable to several privacy and security threats, typically due to poor coding practices used in app development or underlying vulnerabilities in the mobile device operating system

66
New cards

Insecure network communications:

Network traffic needs to be securely encrypted to prevent an adversary from eavesdropping. Apps need to properly authenticate the remote server when connecting to prevent man-inthe-middle attacks and connection to malicious servers.

67
New cards

Web browser vulnerabilities

: Adversaries can exploit vulnerabilities in mobile device web browser applications as an entry point to gain access to a mobile device.

68
New cards

Vulnerabilities in third-party libraries:

Third-party software libraries are reusable components that may be distributed freely or offered for a fee to other software vendors. Software development by component or modules may be more efficient, and third-party libraries are routinely used across the industry. However, a flawed library can introduce vulnerabilities in any app that includes or makes use of that library. Depending on the pervasiveness of the library, its use can potentially affect thousands of apps and millions of users.