9) Confidentiality and Privacy Controls Flashcards

1
Q

What is confidential information of organizations? (3)

A
  • Confidential information leaks can occur when sensitive information is released without authorization.
  • This information can include marketing strategies, trade secrets, financial data, research and development plans, and other proprietary information.
  • Leaks can cause significant damage to a company’s reputation, including loss of customers, legal and regulatory fines, loss of revenue, and difficulty finding new partners.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define confidentiality and privacy controls?

A
  • A confidentiality and privacy controls are security measures or mechanisms designed to safeguard sensitive information from unauthorized access, disclosure, or modification.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do confidentiality and privacy controls aim to do?

A
  • Confidentiality and privacy controls aim to ensure that only authorized individuals or entities can access certain data or information, protecting it from being viewed, tampered with, or stolen by unauthorized parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define a privacy control

A

Privacy control is the use of administrative, technical,
and physical safeguards to protect personal data from
unauthorized access, use, or disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the primary privacy controls concerns? (2)

A

1) Spam: unsolicited e-mail that contains either
advertising or offensive content
2) Identity Theft: Assuming someone’s identity, usually
for economic gain. The unauthorized use of
someone’s personal information for the perpetrator’s benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Southern African Fraud __________ Services
(SAFPS’s) latest fraud statistics assessed between April 2022 and April 2023, impersonation fraud has increased by ___ %.

A

prevention
356

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false, Most of these crimes are inherent in signature and document forgery. This is why it is important to have confidential and privacy controls

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 6 best practices for protecting client confidentiality? (6)

A

1) Use a secure file sharing and messaging platform
2) Control access to physical documents in the workplace
3) comply with industry regulations
4) Hsot routine security training for staff
5) Stay alert for new security threats
6) Utilize up-to-date security technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the strategies for preserving confidentiality and privacy? (6)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe the types of data encryption? (2)

A
  • Symmetric encryption: A cryptographic technique that uses the same key to encrypt and decrypt data
  • Asymmetric Encryption: A cryptographic technique that uses the notion of a key pair: a different key is used for the encryption and decryption process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is symmetric encryption? (6)

A
  • Uses one key to encrypt and decrypt
  • Both parties need to know the key
  • Need to securely communicate the shared key
  • Cannot share key with multiple parties, they
    get their own (different) key from the
    organization
  • The major weakness is that the key must be
    securely shared before two parties may
    communicate securely.
  • Symmetric keys are often shared via an out-ofband method, such as via face-to-face discussion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of symmetric encyption?

A

Secure messaging apps (e.g., WhatsApp, Signal): These messaging platforms use symmetric encryption, such as the Signal Protocol, to ensure that messages are
encrypted end-to-end, allowing only the intended recipients to read the content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption? (6)

A
  • Uses two keys; one key is made public, the other key is kept private
  • Public—everyone has access
  • Private—used to decrypt (only known by
    you)
  • Public key can be used by all your trading partners
  • Can create digital signatures
  • Asymmetric encryption, on the other hand, was created to solve the inherent issue of symmetric encryption: the need of sharing a single encryption key that is used both for encrypting and decrypting data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the differences betwen symmetric and asymmetric encryption? (6)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Techniques for enhancing data privacy in documents? (2)

A

1) Hashing
2) Digital structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is hashing? (3)

A
  • The process of transforming plaintext of any length into a short code called hash.
  • The hashes are fixed-length strings of letters and numbers created using a special algorithm called a hash function.
  • Hashing is a one-way process that prevents access to or
    tampering with the source data.
17
Q

What are digital signatures? (2)

A
  • This is a mathematical technique used to validate the
    authenticity and integrity of a digital document, message or software.
  • Digital signatures can provide evidence of origin, identity and status of electronic documents, transactions or digital
    messages.