Chapter 1 Flashcards
What is Cybersecurity
Protection of information that is stored, transmitted, and processed in a networked system
What is Information Security
Preservation of CIA
What is Network Security
Protection of networks and their services
What are the Key Objectives of Cyber Defenders
- Confidentiality
- Integrity
- Availability
What are the Key Objectives of Hackers
- Disclosure
- Destruction
- Denial
Differentiate System Integrity and Data Integrity
Data integrity ensures data and programs are changed in a specific and authorized manner while system integrity assures a system performs in an unimpaired way
Differentiate Authentication and Authorization
Authentication confirms while authorization gives permission
What are the parts of an OSI Security Architecture
- Security Attack: Any action that compromises security
- Security Mechanism: process or device that detects, prevents, or recover
- Security Service: enhances security processing systems, intended to counter security attacks
Differentiate Peer Entity Authentication and Data Origin Authentication
Peer entity authentication provides confidence in the identity of the entities connected while Data Origin Authentication assures that the source of data is as claimed
What is the GDPR
The General Data Protection Regulation of the EU aims to protect the personal data and privacy of EU residents
What is the scope of the GDPR
Companies and organizations that process the data of EU residents (international and local)
What is Lawfulness, Fairness, and Transparency
Data must be processed as such and individuals must be informed about how their data is used
What is Purpose Limitation
Personal data must be collected for specified, explicit, and legitimate purposes only
What is Data Minimization
Only collect and process data that is necessary for the intended purpose
What is Accuracy
Personal data must be accurate and kept up to date with efforts to correct inaccuracies
What is Integrity and Confidentiality
Data must be processed securely
What is Storage Limitation
Data should be kept no longer than necessary
What is Accountability
Organizations are responsible in following the GDPR and implement appropriate measures
Who are the Key Entities Affected by the GDPR
Controllers and Processors
What are the Rights Enforced by the GDPR
- Right to Access
- Right to Rectification
- Right to Erasure (forgotten)
- Right to Restrict Processing
- Right to Data Portability
- Right to Object (reject)
- Rights Related to Automated Decision-Making: Challenge solely automated decisions
What is Right to Access
Individuals can request access to their personal data from an organization
What is Right to Rectification
Individuals can request the correction of inaccurate or incomplete data
What is Right to Erasure
Individuals can request the deletion of their personal data under certain conditions
What is Right to Restrict Processing
Individuals can limit the way personal data is processed