Module 16 - Protecting Information Flashcards
GDPR law in UK
Data Protection Act 2018
what is the ICO
information commissioner’s office, an independent authority set up to promote access to official information and to protect personal information
Who does GDPR apply to
Any business or organisation which uses information for any business or non-household purpose
The EU directive which led to GDPR required that personal data be:
- processed in a fair manner in accordance with all laws
- collected and processed for a specific, clearly explained, legitimate purpose
- recorded such that it is adequate, relevant and not excessive
- recorded accurately
- kept current
- kept no longer than necessary
Regarding their own personal data, EU citizens have what rights?
- access to data collected about them
- ability and right to correct, erase or block information
- ability and right to object to all uses of data
- ability and right to oppose automated decisions regarding them based on their data
- judical remedy and compensation
Fine imposable for data breach
up to £17 mil or 4% of company’s global turnover
What do companies have to do if there is a breach
report the breach to ICO within 72 hours
What type of information is required to identify a user
- something you have
- something you know
- something you are
Firewalls
A group of systems which enforces an access-control policy between two networks
Denial of service attack
A malicious attack with the intent of restricting the operation of the server. The goal of the attack is to flood the communication ports and memory of the target site to prevent receipt of legitimate messages and the service of legitimate requests for connections
Virus attacks
Viruses are a program or a piece of code loaded onto the computer without the knowledge of the user and can also replicate themselves - uses all available memory and brings system to a halt
Spyware
Malicious software designed to monitor or capture actions carried out by a valid computer user
Potential controls for spam
- email authentication solutions e.g. digital signature recognition
- policies and procedures to train staff
Mutual aid pact
An agreement between two or more companies to share resources with one another in the case of a disaster
Cold site
A company leases a space in a building site or warehouse and design it to hold computer equipment - the site is ready and waiting for a disaster to happen