Chapter 7 - Confidentiality and Privacy Flashcards
What three things should you see when reviewing the efficiency of a training and education program on confidentiality and privacy?
- Have a document policy that aligns with current procedures
- Conduct regular training sessions
3.maintains records to track employee participation and compliance
What is a common attack against hashes? Define it
Collision attack - allows bad actors to create different inputs that result in the same hash value
What is SSH
- Called secure shell
- method for secure remote communications from one computer to another.
- Provides strong authentication and secure channel over internet or unsecured networks
Transport Layer Security
- What does it protect
- What does it authenticate
protect the confidentiality and integrity of data in transit.
Authenticates web server or both then server and client
A digital envelope uses what type of encryption?
Asymmetric and symmetric encryption
Performing regular audits and checking system logs are examples of what?
Reactive measures
- detect ongoing crimes and crimes that have already been committed
Digital signatures use what?
Hashing and asymmetric encryption
What helps the autior understand how a carved out org communicates to subcompany in Soc 2
Orgs contractual agreement
What governance process involves creating usage policies based on sensitive data classifications?
Data loss prevention
What would you do to compare the process with the documented policy?
Walkthrough
Which Principle compares your company to other companies in the same industry?
Governance
How can you monitor data usage through automated and manual activities as part of a data loss prevention program?
Data Access logs
-Logs provide an audit trail showing the date, time, and user who created, read, updated, or deleted data.
Who selects members of the incident handling and incident response teams?
Senior Management
What encryption uses AES
-Generate keys of 128, 192,258
-uses the same key for encryption and decryption
Symmetric encryption
What encrpytion uses RSA
- Generate keys of 2048, 3072, 4096
-Uses a public key for encryption and a private key for decryption
-used for digital signatures
Asymmetric encryption