Confidentiality and privacy ( Topic 5) Flashcards
Trust services Framework
Security
• Access to the system and its data is controlled and restricted to legitimate users.
Confidentiality
• Sensitive organisational information (e.g. marketing plans, trade secrets) is protected from unauthorised disclosure.
Privacy
• Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorised disclosure.
Processing Integrity
• Data are processed accurately, completely, in a timely manner, and only with proper authorisation.
Availability
• A system and its information are available to meet operational and contractual obligations.
Confidentiality of Intellectual Property (IP)
What to protect?
• Strategic plans • Trade secrets • Cost information • Legal documents • Process improvements • All need to be secured - As they can all be sources of competitive advantage
Data masking ( Tokenization)
To protect privacy organizations run data masking programs that replace such personal information with fake values before sending that data to the program development and testing system.
The fake data are called tokens; hence data masking is often referred to as tokenization.
Steps in Securing IP( intellectual property)
- Identify and classify ( classify - what is the impact if lost)
- Encryptions - Process of obscuring information to make it unreadable without special knowledge, access or key
- Controlling Access - Information rights management
- Training employees of what can /can’t be read, accessed, copied , deleted , downloaded
Privacy Concerns
Deals with protecting customer information
1. Spam-unsolicited e-mail that contains either advertising or offensive content.
2. Identity theft-assuming someone’s identity, usually for financial gain.
Companies have access to and thus must control customer’s personal information.
CAN-SPAM’s guidelines or risk sanctions. Key provisions include the following:
● The sender’s identity clearly displayed in the header of the message.
● The subject field clearly identify the message as an advertisement or solicitation.
● The body of the message provide recipients with a working link that can be used to opt out of future e-mail.
● The body of the message must include the sender’s valid postal address
● Organizations should not send commercial e-mail to randomly generated addresses, nor should they set up websites designed to “harvest” e-mail addresses of potential customers
How to preserve the confidentiality of sensitive information
(1) identify and classify the information to be protected,
(2) encrypt the information,
(3) control access to the information, and
(4) train employees to properly handle the information.
How to preserve the confidentiality of sensitive information
- Identify and classify information
- identify where such information resides and who has access to it
- this inventory process can be time consuming and costly
- the next step is to classify the information in terms of its value to the organization
How to preserve the confidentiality of sensitive information
- Protecting confidentiality ( Encryption)
Encription It is the only way to protect information in transit over the Internet.
- Also a necessary part of defense-in-depth to protect information stored on websites or in a public cloud
- Encryption only protects information while it is stored or being transmitted, not during processing, Thus, the employees (such as the Database Administrator and data analysts) who run the programs that use sensitive information can potentially view confi- dential information
Controlling access to sentsitive information
information rights management (IRM) - Software that offers the capability not only to limit access to specific files or documents but also to specify the actions
-Some IRM software even has the ca-pability to limit access privileges to a specific period of time and to remotely erase protected files.
Data loss prevention (DLP) software, which works like antivirus programs in reverse, blocking outgoing messages (whether e-mail, IM, or other means) that contain key words or phrases associated with the intellectual property or other sensitive data the organization wants to protect. DLP software is a preventive control. – accesses outbound traffic
-can and should be supplemented by embedding code called a digital watermark
Access controls designed to protect confidentiality must be continuously reviewed and modified to respond to new threats created by technological advances
Virtualization and cloud computing also affect the risk of unauthorized access to sensitive or confidential information ( highly sensitive and confidential data probably should not be stored in a public cloud because of lack of control over where that information is actually stored and because of the risk of unauthorized access)
Digital watermark
The digital watermark is a detective control that enables an organization to identify confidential information that has been disclosed, disclosure of sensitive information.
When an organization discovers documents containing its digital watermark on the Internet, it has evidence that the preventive controls designed to protect its sensitive information have failed.
Should then investigate how the compromise occurred and take appropriate corrective action
How to preserve the confidentiality of sensitive information
- Training
Training is arguably the most important control for protecting confidentiality.
Employees need to know what information they can share with outsiders and what information needs to be protected
Privacy Regulatory Acts
Spam Act 2003 (Cth) Cybercrime Act 2001
Criminal Code Amendment (Theft, Fraud, Bribery & Related Offences) Act 2000
Generally Accepted Privacy Principles
-Management
-Notice
-Choice and consent
-Collection
-Use, retention, and disposal
-Access
-Disclosure to third parties
-Security
Quality
Generally Accepted Privacy Principles
- Management
• Procedures and policies with assigned responsibility and accountability
Generally Accepted Privacy Principles
- Notice
• Provide notice of privacy policies and practices prior to collecting data
Generally Accepted Privacy Principles
- Choice and consent
• Opt-in versus opt-out approaches
- Organizations should explain the choices available to individuals and obtain their consent prior to the collection and use of their personal information
Generally Accepted Privacy Principles
- Collection
• Only collect needed information
One particular issue of concern is the use of cookies on websites
Cookie
text file created by a website and stored on a visitor’s hard disk. Cookies store information about what the user has done on the site
Generally Accepted Privacy Principles
-Use, retention, and disposal
• Use information only for stated business purpose. When no longer useful, dispose in a secure manner.
Generally accepted privacy principles
- Access
• Customer should be able to review, correct, or delete information collected on them
Generally Accepted Privacy Principles
-Disclosure to third parties
Organizations should disclose their customers’ personal in- formation to third parties only in the situations and manners described in the organization’s privacy policies and only to third parties who provide the same level of privacy protection as does the organization that initially collected the information
Generally Accepted Privacy Principles
-Security
• Protect from loss or unauthorized access
Achieving an acceptable level of infor- mation security is not sufficient to protect privacy. It is also necessary to train employees to avoid practices that can result in the unintentional or inadvertent breach of privacy
Generally Accepted Privacy Principles
-Quality
- Organizations should maintain the integrity of their customers’ personal in- formation and employ procedures to ensure that it is reasonably accurate
encryption
the process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext.
- Preventive control
- Decryption reverses this process