Confidentiality Flashcards

1
Q

What is Snooping? How is it countered?

A
  • Unauthorised users are actively looking for sensitive information within a workplace.
  • Snooping is countered by having clean desk policy, where workers are to have a clean desk at all times with no important documents laying about.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Dumpster Diving? How can risks be mitigated?

A
  • Individuals are looking for sensitive information in trash or dumpster.
  • Shredding documents or other sensitivie information is to be in place mitigate risks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Eavesdropping? How can it be mitigated?

A
  • Individuals are listening in on conversations of sensitive nature.
  • To protect against eavesdropping, enforcing rules having sensitive conversations within conference rooms or private offices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Social Engineering? How to best prevent this type of attack?

A
  • Social Engineering is the use of psychological tactics to trick users into providing sensitive information or access to a system.
  • Educating users on social engineering tactics can prevent the leak of confidential information or acess to a system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Wiretapping? How to protect against Wiretapping?

A
  • Hackers have acquired access to a network and monitoring data sent electronically.
  • Best practices to avoid wiretapping is to use encryption standards when transmitting data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly