Set 5 – Encryption and Access Controls (Vocabulary)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key terms from Encryption and Access Controls (Pages 1–2).

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Pseudonymous Data

Data points which are not directly associated with a specific individual. The identity of the person is not known but multiple appearances of that person can be linked together.

2
New cards

Psychographic Advertising

Based on a user's interest as accounted for by their preferences online.

3
New cards

Public Key Infrastructure (PKI)

A system of digital certificates, authorities and registration entities verifying authenticity through cryptography.

4
New cards

Public Records

Information collected and maintained by a government entity and available to the general public.

5
New cards

Quality Attributes

Concerns in software development that cannot be alleviated with a single design element or function.

6
New cards

Radio-Frequency Identification (RFID)

Technologies that use radio waves to identify people or objects carrying encoded microchips.

7
New cards

Re-identification

The process of using publicly available information to re-associate personally identifying information with anonymized data.

8
New cards

Remnant Advertising

The most basic, stripped down form of web advertising when no data is available about the user or webpage.

9
New cards

Retention

Organizations should retain personal information only as long as necessary to fulfill the stated purpose.

10
New cards

Right of Access

The right of individuals to obtain data about themselves from data controllers upon request.

11
New cards

Role-Based Access Controls (RBAC)

Access policies ensuring employees only have the necessary access for their job.

12
New cards

RSA (Rivest-Shamir-Adleman) Encryption

Most common internet encryption system, using prime numbers to generate public/private key pairs.

13
New cards

Seal Programs

Programs requiring participants to abide by privacy codes and monitoring, allowing display of a compliance seal.

14
New cards

Secret Key

A cryptographic key uniquely associated with entities and not to be made public, requiring protection from disclosure.

15
New cards

Security Safeguards

Principle that personal data should be protected by reasonable security safeguards against loss, access, or disclosure.

16
New cards

Single-Factor Authentication

Standard authentication mechanism requiring a username and password.

17
New cards

Single-Sign-On (SSO)

Authentication process allowing one set of credentials to access multiple applications.

18
New cards

Social Engineering

Tactics used by attackers to manipulate individuals into revealing confidential information.

19
New cards

Software Requirements Specification (SRS)

Formal documentation of a software system’s requirements.

20
New cards

Spear Phishing

Phishing targeted at specific groups or individuals with known affiliations.

21
New cards

SQL Injection

Attack inserting commands into SQL input fields to exploit databases.

22
New cards

Storage Encryption

Use of encryption to protect stored or backed-up data.

23
New cards

Structured Query Language (SQL)

A programming language for managing and querying relational databases.

24
New cards

Super Cookie

A persistent tracking mechanism that remains even after standard cookies are deleted.

25
New cards

Surveillance Collection

Collecting data by observing user activity streams without interference.

26
New cards

Symmetric Key Encryption

Encryption method using a single key for both encryption and decryption.

27
New cards

Syndicated Content

Content developed/licensed by a third party, sometimes introducing security risks.

28
New cards

Terms of Service

Rules governing use of a service, which users must agree to.

29
New cards

Third-Party Collection

Data collected and transferred to another party for repurposing.

30
New cards

Transfer

Sending personal data cross-border or between companies as necessary for operations.