Ch 16 Security and Privacy Flashcards

1
Q

Why is privacy critically important?

A

HRIS data collected is confidential personal data
Places where files are stored need different types of security depending on where it’s stored.
Strong security plans and procedures are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How has the face of privacy changed?

A
  • More ppl aware of privacy issues and how data is used
  • more data collected, stored, and used
  • more legislative requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many records have been breeched between 2005-2010?

A

500 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the risks employees pose to security?

A
Unauthorized access
unauthorized disclosure
unauthorized disclosure of data accuracy 
Data entry error
Use of data in unauthorized way
No org created policies and procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of privacy policies must companies create?

A

clear reasonable that are revised and reviewed annually and signed off on by employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the cube that allows analysts to identify the info flows within an HRIS?

A

McCumber Cube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 sides of the cube?

A

What you are protecting - Confidentiality, Integrity, Availability
When data needs to be protected - transmission, storages, processing
How to protect - Human factors, Policies & procedures, technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the security threats that are posed to the system?

A
Human error
Disgruntled employees & ex-ees
Other internal attackers
external hackers
natural disasters
Back-ups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are potential uses of inappropriately acquired info?

A
extortion
theft
computer-based fraud
cyber terrorism
phishing
denial of service
software threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the types of software threats?

A
Computer virus
worms
spyware
blended threats
trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some best practices security practices?

A
  • comprehensive info security and privacy policy
  • store sensitive data in secure and appropriately encrypted way
  • properly dispose of documents
  • build document destruction into office
  • implement and update all measures
  • conduct walkthroughs to identify previously unidentified gaps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly