Chapter 12 - Confidentiality and Privacy Controls Flashcards
What is information rights management (IRM)?
Software that offers the capability not only to limit access to specific files or documents but also to specify that actions that individuals granted access to that resource can perform.
What is data loss prevention (DLP)?
Software that works like antivirus programs in reverse, blocking outgoing messages that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect.
What is a digital watermark?
Code embedded in documents that enables an organization to identify confidential information that has been disclosed.
What is data masking?
Protecting privacy by replacing sensitive persona information with fake data.
What is tokenization?
Another word for data masking.
What is encryption?
The process of transforming normal text (plaintext) into unreadable gibberish (ciphertext).
What is decryption?
Transforming ciphertext back into plaintext.
what is a symmetric encryption system?
Encryption systems that use the same key to both encrypt and decrypt.
What is an asymmetric encryption system?
Encryption systems that use two keys, one public and one private; either key can encrypt, but only the other matching key can decrypt.
What is a public key?
One of the keys used in asymmetric encryption systems; it is widely distributed and available to everyone.
What is a private key?
One of the keys used in asymmetric encryption systems; it is kept secret and known only to the owner of that pair of public and private keys.
What is key escrow?
The process of storing a copy of an encryption key in a secure location.
What is a virtual private network?
Using encryption and authentication to securely transfer information over the Internet, thereby creating a “virtual” private network.
What is hashing?
Transforming plaintext of any length into a short code called a hash.
What is a hash?
Plaintext transformed into short code.