5. Operations: Protecting PI Flashcards
What are the PbD fundamentals?
- Determination of the of the information privacy security control requirements
AND
- Insurance that controls are successfully designed, engineered, deployed, and monitored throughout the lifecycle of the product, service, IT system, and business process
What are the PbD foundational principles?
- Proactive not preventive; preventative, not remedial
- Privacy as the default
- Privacy embedded into design
- Full functionality - positive-sum, not zero-sum
- End-to-end security - full lifecycle protection
- Visibility and transparency
- Respect for user privacy
What does the PbD paradigm ensure?
Privacy and security controls are:
- Aligned with an organization’s tolerance for risk
- Compliance with regulations
AND
- Commitment to building a sustainable privacy-minded culture
What are the qualities of the PbD paradigm?
- Proactivity
- Embedded privacy controls
- Respect for users
Is PbD a GDPR requirement?
Yes Article 25 from Chapter IV and Recital 78 require that data privacy be built into the design and process and not added on as an afterthought.
What are the data protection by design requirements of the GDPR?
- Lawfulness, fairness, and transparency (data subject)
- Purpose limitation
- Data minimization
- Accuracy
- Storage limitation
- Integrity and confidentiality
- Accountability
What are the objectives of information security?
Confidentiality, integrity, availability (CIA) throughout the data lifecycle
What concepts does information security include?
Accountability - entity ownership list traceable
AND
Assurance - CIA objectives are met
How does information security define risk?
A combination of of the probability of an event and its consequences (ISO/IEC 73)
What are the the information security risk management practices?
- Identification of risk
- Selection and implementation of controls and measures to mitigate risk
- Tracking and evaluation of risk to validate the first two parts
What are some of the information security risks?
- Cloud-based threats
- Insider threats
- Remote worker endpoint security
- Phishing attacks
- Deepfakes
- Internet of Things Devices
- Malvertising
- Fileless attacks and living off the land
- Ransomware attacks
- Social media based attacks
What are the information security controls?
Categories:
1. Preventive
2. Detective
3. Corrective
Nature:
1. Physical
2. Administrative
3. Technical
E.g.:
1. Policies
2. Organization of information security
3. Asset management
4. Access control
5. Cryptography
6. Physical and environmental security
7. Operational security
8. Communications security
9. Systems acquisition, development, maintenance, and disposal
10. Supplier relationships (incident and business continuity management)
11. Compliance
What is the difference between data privacy and information security?
Data privacy - the rights of an individual to control how and to what extent their personal information is collected and further processed
Information security - assuring CIA information assets
What are the overlaps between data privacy and information security?
- integrity (security) / accuracy (privacy) - both ensure that data is not altered without authorization
- Availability (security) / access (privacy) - availability supports access because of data is not available, it cannot be accessed
- Accountability (both) - data owners are responsible for data protection in accordance with the respective protection regimen
- Confidentiality (when the data is both PI and nonpublic) - confidentiality supports privacy because non public information must be kept non-public
What are the disconnects between data privacy and information security?
- Privacy has a wider set of obligations and responsibilities (collection limitation, opens, relevance, and use limitation) and security focuses on CIA
- Disconnect in confidentiality. PI is not always nonpublic (e.g., phonebook), therefore the notion of confidentiality does not apply.
- Security techniques can be privacy enhancing technologies but can also be applied in an invasive manner. “You can have security without privacy, but you cannot have privacy without security.