Privacy Engineering Flashcards

1
Q

It involves taking account of privacy during the entire life cycle of ICT

A

Privacy engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

focuses on implementing techniques that decrease privacy risks and enables organizations to make purposeful decisions about resource allocation and effective implementation of controls in information systems

A

Privacy engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy engineering involves both technical capabilities and management processes. The primary goals of privacy engineering are to:

A
  • Incorporate functionality and management practices to satisfy privacy requirements
  • Prevent compromise of PII
  • Mitigate the impact of breach of personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result

A

Security Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

includes a disciplined, structured, and flexible process for organizational asset valuation; security and privacy control selection, implementation, and assessment;

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the four steps of Risk Management iterative process?

A

Assess risk based on assets, threats, vulnerabilities, and
existing controls. From these inputs, determine impact
and likelihood and then the level of risk.

o Identify potential security controls to reduce risk,
prioritize their use, and select controls for
implementation.

o Allocate resources, roles, and responsibilities and
implement controls.

o Monitor and evaluate risk treatment effectiveness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

are system requirements that have privacy relevance.

A

Privacy requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is an analysis how information is handled: to ensure handling conforms to applicable legal, regulatory, and policy requirements regarding privacy;

A

Privacy impact assessment (PIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

focus on the types of capabilities the system needs to demonstrate the implementation of an organization’s privacy policies and system privacy requirements

A

Privacy engineering and security objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly