IS 414 CH. 9 Flashcards

1
Q

What is the chapter about?

A

Preserving the confidentiality or an organization’s intellectual property AND Protecting the privacy of personal information it collects from customers, employees, suppliers, and business partners.
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 Actions taken to preserve confidentiality of sensitive info

A
  1. Identify and classify info to be protected
  2. Encrypt the information
  3. Control access to the info
  4. train employees to properly handle the info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Identify and classify info to be protected

A
  1. Find where info resides and who has access to it
  2. Classify value in terms of its value to the organization
    * **classification is the responsibility of info owners, not info security professionals because only the former understand how the info is used.
  3. Once classified, set of controls are deployed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encrypt the information

A

-Only way to protect info in transit over the internet
Sensitive info is exposed in plain view whenever it is being processed by a program, displayed on a monitor, or included in printed reports. Protecting confidentiality requires application of the principles of defense-in-depth, supplementing encryption with the two of the other components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control access to the info

A

Basic authentication and authorization controls need to be supplemented with additional digital and physical access controls
Importance of proper disposal of sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Info Rights Management (IRM)

A

Software that offers the capacity not only to limit access to specific files or documents, but also to specify the actions (read. copy. print, download, etc) that individuals who are granted access to that resource can perform. Some IRM software even has the capability to limit access privileges to a specific period of time and to remotely erase protected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data loss prevention (DLP) (preventative tool)

A

Software which works like antivirus programs in reverse, blocking outgoing messages (emails, instant messaging, etc) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital Watermark

A

DLP should be supplemented by embedding code called a digital watermark in documents. The digital watermark is a detective control that enables an organization to identify confidential info that has been enclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

train employees to properly handle the info

A

Need to know what info that can share with outsiders and what info needs to be protected.
Need to be taught how to protect confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy

A

focuses on protecting personal info about customers, employees, suppliers or business partners rather than organizational data
control used protect privacy are the same for protecting confidentiality
(i.e. 1. Identify and classify info to be protected
2. Encrypt the information
3. Control access to the info
4. train employees to properly handle the info)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

privacy controls

A
  1. Find out what info the organization possess and where info resides and who has access to it
  2. Put controls in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data masking (tokenization)

A

program that protects privacy by replacing personal info with fake values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

privacy concerns

A

spam and identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

spam

A

unsolicited email that contains either advertising or offensive content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controlling the Assault of Non-solicited Porn and Marketing (CAN-SPAM) key provisions

A
  • sender’s identity must be clearly displayed in the header of the message
  • subject field must clearly identify the messages as an ad or solicitation
  • body must have opt-out option, 10 days to implement the request
  • body must include the sender’s valid postal address
  • should not sent commercial emails to randomly generated emails, have an opt-in button on website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

identity theft

A

assuming someone’s identity, usually for economic gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Privacy Regulations & Generally Accepted Privacy Principles (GAPP)

A
Management 
Notice 
Choice & Consent
Collection
Use and retention 
Access
Disclosure to third parties
Security 
Quality
Monitoring and enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Management

A

Organizations need to establish a set of procedures and policies for protecting the privacy of personal info they collect. Assign responsibility and accountability for implementing those policies and procedures to a specific person or group of employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Notice

A

Organization should provide notice about its privacy policies and practices at or before it collects personal info or as soon as reasonable after
Explain what info is collected, why its collected, how it will be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Choice & Consent

A

Organization must explain choices available to individuals and obtain their consent prior to collection and use of their personal info
US - opt out policy: organizations collect until customer objects
Europe: opt in policy: organizatoins cannot collect until customers approve

21
Q

Collection

A

Organization only collect the info needed to fulfill the purposes stated in its privacy policies. Concern is the use of the cookie - browsers can not accept cookies, and organizations have to abide by that

22
Q

Use and retention

A

Organization should use customers’ personal info only in the manner described in their stated privacy policies and retain that info only as long as it is needed to fulfill a legit business purpose.

23
Q

Access

A

Organization should provide individuals with the ability to access, review, correct, and delete the personal info stored about them

24
Q

Disclosure to third parties

A

Organization should disclose their customers’ info to third parties only in the situation and manners described in the privacy policies and only to parties who provide the same level of protection

25
Q

Security

A

Organization must take reasonable steps to protect customers’ personal info from loss or unauthorized disclosure

26
Q

Quality

A

Organization should maintain the integrity of their customers’ personal info and employ procedures to ensure that is reasonably accurate

27
Q

Monitoring and enforcement

A

Organization should assign one or more employee to be responsible for ensuring compliance with its stated policy and make sure employees are in compliance

28
Q

Cookie

A

a text file created by a website and stored on a visitor’s hard drive. cookies store info about who the user is and what the user has done on the site

29
Q

Encryption

A

the process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext

encryption and decryption involve a key an algorithm

30
Q

decryption

A

transforming ciphertext back into plaintext

31
Q

Factors that influence encryption strength

A
  1. key length
  2. encryption algorithm
  3. policies for managing the crytographic keys
32
Q

key length

A

longer keys provide stronger encryption by reducing the number of repeating blocks in the ciphertex, makes it harder to spot patterns in the text

33
Q

encryption algorithm

A

strong algorithm is difficult to break just by guessing, should not make their own, but purchase

34
Q

Managing cryptographic keys

A

if the keys have been stolen, then it is easily broken
keys must be stored securely and protected with strong access controls: (1) not storing in browser or any other file that other users of t hat system can readily access and (2) using a strong (And long) passphrase to protect the keys

35
Q

Symmetric encryption systems

A

encryption that use the same key to both encrypt and decrypt
advantages: speed
disadvantages: requires separate keys for everyone who wishes to communicate, must find secure way to share secret key with other party
risk issues: protecting shared secret key from loss or theft
primary use: encryption of large amounts of info

36
Q

Asymmetric encryption systems

A

encryption that uses two keys (one public, one private)
either key can encrypt, but only the other matching key can decrypt
advantages: everyone can use your public key to communicate with you, no need to store keys for each party with whom you communicate with, can be used to create legally binding digital signatures
disadvantages: slower, requires PKI to validate ownership of public keys
risk issues: protecting shared secret key from loss or theft
primary use: creation of digital signatures, secure exchange of symmetric keys via email

37
Q

public key

A

one of the keys used in Asymmetric encryption systems, widely distributed and available to everyone

38
Q

private key

A

one of the keys used in Asymmetric encryption systems, kept secret and known only to the owner of that pair of public and private keys

39
Q

key escrow

A

the process of storing a copy of an encryption key in a secure location

40
Q

hashing

A

transforming plaintext of any length into a short code called a hash

41
Q

hash

A

plaintext that has been transformed into short code

42
Q

hashing vs. encryption

A

HASHING: one way function (cannot “unhash” or reverse), any size input yields same fixed-size output

ENCRYPTION: reversible (able to decrypt), output size approximately same as input

43
Q

non repudiation

A

creating legally binding agreements that cannot be unilaterally repudiated by either party

44
Q

digital signature

A

a hash encrypted with the hash creator’s private key

  1. document creator uses a hashing algorithm to generate a hashing of the original document
  2. document creator uses his/her private key to encrypt the hash created in step 1
    result: the encrypted hash is a legally-binding digital signature
45
Q

digital certificate

A

an electronic document that certifies the identity of the owner of a particular public key and contains that party’s public key

46
Q

certificate authority

A

an organization that issues public and private keys and records the public key in a digital certificate

47
Q

public key infrastructure

A

the system for issuing pairs of public and private keys and corresponding digital certificates

48
Q

virtual private networks

A

using encryption and authentication to securely transfer information over the internet, thereby creating a “virtual” private network