9. Confidentiality and Privacy Controls Flashcards

1
Q

What is confidentiality

A

Confidentiality relates to organizational intellectual property which includes strategic plan, trade secrets, cost information, legal documents etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the controls that can be used to protect the confidentiality(fortroligt) of sensitive(følsom) information.

Tip: a) encryption, b) authorization and authentication, c) training is the most important aspect of ensuring confidentiality, but training who?

A

a) encrypt the information
b) control access to the information, authorization and authentication
c) training employees to properly handle the information. Training is the most important part for ensuring confidentiality, employees need to know what can and cant be shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is privacy and how to protect privacy?

Tip: the controls are the same as to protect confidentiality.

A

Privacy focuses on protecting personal information on customers, vendors, employees, and business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main goal of the generally accepted privacy principles (GAPP) framework

Tip: guidance

A

Generally accepted privacy principles (GAPP) framework provides guidance on how to protect personal information the organization collects from customer, suppliers and employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption is a preventative control

What types of encryption are there?

A

Encryption is a preventative control. Types of encryption are symmetric and asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain symmetric encryption

A

Symmetric encryption uses one key to encrypt and decrypt, both parties need to know the key. The transaction speed is fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain asymmetric encryption

A

Asymmetric uses two key, one key is public and the other key is private which is used to decrypt. Transaction speed is slow, but can create digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain digital signatures

Tip: hashing

A

Hashing (digital signatures)
Hashing transforming plaintext of any length into a short code called a hash.

Digital signature
A hash encrypted with the hash creator’s hash private hash.

The hash cant go back to orignial text, each time the document changes, a new hash is generated. Thats why digital signatures can be used as legally binding documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly