Chapter 12 - Confidentiality and Privacy Controls Flashcards

1
Q

What is information rights management (IRM)?

A

Software that offers the capability not only to limit access to specific files or documents but also to specify that actions that individuals granted access to that resource can perform.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data loss prevention (DLP)?

A

Software that works like antivirus programs in reverse, blocking outgoing messages that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a digital watermark?

A

Code embedded in documents that enables an organization to identify confidential information that has been disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data masking?

A

Protecting privacy by replacing sensitive persona information with fake data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is tokenization?

A

Another word for data masking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

The process of transforming normal text (plaintext) into unreadable gibberish (ciphertext).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is decryption?

A

Transforming ciphertext back into plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a symmetric encryption system?

A

Encryption systems that use the same key to both encrypt and decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an asymmetric encryption system?

A

Encryption systems that use two keys, one public and one private; either key can encrypt, but only the other matching key can decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a public key?

A

One of the keys used in asymmetric encryption systems; it is widely distributed and available to everyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a private key?

A

One of the keys used in asymmetric encryption systems; it is kept secret and known only to the owner of that pair of public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is key escrow?

A

The process of storing a copy of an encryption key in a secure location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virtual private network?

A

Using encryption and authentication to securely transfer information over the Internet, thereby creating a “virtual” private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is hashing?

A

Transforming plaintext of any length into a short code called a hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a hash?

A

Plaintext transformed into short code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is nonrepudiation?

A

Creating legally binding agreements that cannot be unilaterally repudiated by either party.

17
Q

What is a digital certificate?

A

An electronic document that certifies the identity of the owner of a particular public key and contains that party’s public key.

18
Q

What is a certificate authority?

A

An organization that issues public and private keys and records the public key in a digital certificate.

19
Q

What is public key infrastructure (PKI)?

A

The system of issuing pairs of public and private keys and corresponding digital certificates.

20
Q

What is a nonce?

A

A random number used in the mining process to validate a new block in a blockchain.