Midterm Flashcards
4 actions to preserve confidentiality
Identify and classify information
Encryption
Control access- authentication and authorization
Train employees
Data loss prevention
Software that blocks outgoing messages that contain key words of sensitive information
Digital watermark
Code embedded in documents that identifies confidential information
10 best practices for protecting customers’ privacy
Management- set of policies
Notice- about its policies
Choice and consent- customers must agree to terms
Collection- only collect what is needed
Use, retention, disposal- for a business purpose
Access- customers should have access to info about themselves
Disclosure to third parties
Security
Quality
Monitoring and enforcement
Asymmetric encryption systems
Use two different keys (public and private) to encrypt and decrypt
Secure exchange of keys via email, digital signatures
Key escrow
Storing copies of encryption keys in a secure location
Hashing
Produces a code of a fixed short length regardless of size. Cannot be decrypted back to original text.
Creates a digital signature with hash creator’s private key
Digital certificate
Certifies the identity of the owner of a public key
Public key infrastructure
System that issues pairs of public and private keys and digital certificates
Virtual private network
A network of information securely transferred using encryption and authentication
Data entry controls
Field check- numeric or string Sign check Limit check Range check Size check- number of digits/characters Completeness check Validity check Reasonableness test
Processing controls
Data matching File labels- correct and most current files are being updated Recalculation of batch totals Cross-footing and zero balance tests Write-protection mechanisms Concurrent update controls
Batch totals
Calculate numeric values for a batch of input records
Financial total, hash total, record count
Fault tolerance
The capability of a system to continue functioning when a component fails
Redundant arrays of independent drives (RAID)
Records data on multiple disk drives to reduce risk of data loss
Uninterruptible power supply
Protects in event of power outage, uses battery power to enable system to operate to back up critical data
Recovery point objective
The maximum amount of data an organization is willing to lose
Disaster recovery plan three options
Cold site
Hot site
Real time mirroring