Prelim Flashcards

1
Q

refers to any information, whether recorded in a
material form or not, from which the identity of an individual is
apparent or can be directly ascertained by the entity holding the
information

A

Personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

concerns the collection and use of data about individuals

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

part of the data protection area that deals with
the proper handling of data, with the focus on compliance
with data protection regulations.

A

Data privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

includes a set of standards and different
safeguards and measures that an organization is taking to
prevent any third party from unauthorized access to digital data
or any intentional or unintentional alteration, deletion, or data
disclosure

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an unauthorized or unintentional
disclosure of confidential information.

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the stealing of data or confidential
information by electronic means, including ransomware
and hacking.

A

Cyberattack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a model designed to guide an organization’s
policies on information security.

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ensures that data is accessed only by
authorized individuals.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ensures that information is reliable as well as
accurate

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ensures that data is both available and
accessible to satisfy business needs.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

particularly
sensitive, as it may easily use to commit online and/or
offline fraud.

A

Financial privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the process of ingesting, storing,
organizing, and maintaining the data created and collected by an
organization

A

Data management –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

are subject to
stringent laws that address user access privileges. By
law, security and authentication systems are often
required for individuals

A

Medical privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

websites
publish a privacy policy that details the website’s
intended use of collected online and/or offline collected
data.

A

Internet privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

information that can be used to distinguish or trace an
individual’s identity

A

personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

take privacy requirements into
account throughout the system development process, from the
conception of a new IT system through detailed system design,
implementation, and operation.

A

Privacy by Design

17
Q

These are system requirements
that have privacy relevance. System privacy
requirements define the protection capabilities provided
by the system, the performance and behavioral
characteristics exhibited by the system,

A

Privacy requirements

18
Q

This principle requires an organization
to ensure that it only processes the data that is necessary to
achieve its specific purpose and that PII is protected during
collection, storage, use, and transmission

A

Privacy as the default:

19
Q

g focuses on implementing techniques that
decrease privacy risks and enables organizations to make
purposeful decisions about resource allocation and effective
implementation of controls in information

A

Privacy Engineering

20
Q

involves taking account of privacy during the
entire life cycle of ICT

A

Privacy Engineering

21
Q

t is an expectation of loss expressed
as the probability that a particular threat will exploit a particular
vulnerability with a particular harmful result.

A

Security risk assessment i

22
Q

includes a disciplined, structured, and
flexible process for organizational asset valuation; security and
privacy control selection, implementation, and assessment;
system and control authorizations

A

Risk management

23
Q

are system requirements that have
privacy relevance. System privacy requirements define the
protection capabilities provided by the system, the performance
and behavioral characteristics exhibited by the system

A

Privacy requirements

24
Q

is an analysis of how
information is handled: to ensure handling conforms to
applicable legal, regulatory, and policy requirements regarding
privacy; to determine the risks and effects of collecting,

A

Privacy impact assessment

25
Q

PbD seeks to assure users and
other stakeholders that privacy-related business practices and
technical controls are operating according to state commitments
and objectives.

A

Visibility and transparency:

26
Q

Privacy protections should
be core, organic functions, not added on after a design is
complete.

A

Privacy embedded into the design

27
Q

Privacy protections should
be core, organic functions, not added on after a design is
complete.

A

Privacy embedded into the design