IS 414 CH. 9 Flashcards
What is the chapter about?
Preserving the confidentiality or an organization’s intellectual property AND Protecting the privacy of personal information it collects from customers, employees, suppliers, and business partners.
Encryption
4 Actions taken to preserve confidentiality of sensitive info
- Identify and classify info to be protected
- Encrypt the information
- Control access to the info
- train employees to properly handle the info
Identify and classify info to be protected
- Find where info resides and who has access to it
- Classify value in terms of its value to the organization
* **classification is the responsibility of info owners, not info security professionals because only the former understand how the info is used. - Once classified, set of controls are deployed
Encrypt the information
-Only way to protect info in transit over the internet
Sensitive info is exposed in plain view whenever it is being processed by a program, displayed on a monitor, or included in printed reports. Protecting confidentiality requires application of the principles of defense-in-depth, supplementing encryption with the two of the other components
Control access to the info
Basic authentication and authorization controls need to be supplemented with additional digital and physical access controls
Importance of proper disposal of sensitive info
Info Rights Management (IRM)
Software that offers the capacity not only to limit access to specific files or documents, but also to specify the actions (read. copy. print, download, etc) that individuals who are granted access to that resource can perform. Some IRM software even has the capability to limit access privileges to a specific period of time and to remotely erase protected files
Data loss prevention (DLP) (preventative tool)
Software which works like antivirus programs in reverse, blocking outgoing messages (emails, instant messaging, etc) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect
Digital Watermark
DLP should be supplemented by embedding code called a digital watermark in documents. The digital watermark is a detective control that enables an organization to identify confidential info that has been enclosed
train employees to properly handle the info
Need to know what info that can share with outsiders and what info needs to be protected.
Need to be taught how to protect confidential data
Privacy
focuses on protecting personal info about customers, employees, suppliers or business partners rather than organizational data
control used protect privacy are the same for protecting confidentiality
(i.e. 1. Identify and classify info to be protected
2. Encrypt the information
3. Control access to the info
4. train employees to properly handle the info)
privacy controls
- Find out what info the organization possess and where info resides and who has access to it
- Put controls in
data masking (tokenization)
program that protects privacy by replacing personal info with fake values
privacy concerns
spam and identity theft
spam
unsolicited email that contains either advertising or offensive content
Controlling the Assault of Non-solicited Porn and Marketing (CAN-SPAM) key provisions
- sender’s identity must be clearly displayed in the header of the message
- subject field must clearly identify the messages as an ad or solicitation
- body must have opt-out option, 10 days to implement the request
- body must include the sender’s valid postal address
- should not sent commercial emails to randomly generated emails, have an opt-in button on website
identity theft
assuming someone’s identity, usually for economic gain
Privacy Regulations & Generally Accepted Privacy Principles (GAPP)
Management Notice Choice & Consent Collection Use and retention Access Disclosure to third parties Security Quality Monitoring and enforcement
Management
Organizations need to establish a set of procedures and policies for protecting the privacy of personal info they collect. Assign responsibility and accountability for implementing those policies and procedures to a specific person or group of employees
Notice
Organization should provide notice about its privacy policies and practices at or before it collects personal info or as soon as reasonable after
Explain what info is collected, why its collected, how it will be used