Privacy enhancing technologies Flashcards

1
Q

What are the privacy enhancing tecnology to be aware of?

A

Data minimization - limiting data collection to only what is required to fulfill a specific purpose

  • when an organization applies data minimization, any processing they do will only use the lease amount of data necessary.
  • Data collected should not be used for any other purpose or process without consent from the data subject.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Privacy enhancing technlogy to be aware of?

A

Data masking: protect sensitive data, while providing a functional alternative when real data is not needed for example, in user training, sales demos or software testing.

  • change the values of the data while using the same format.
  • Goal is to create a version that cannot be deciphered or reverse engineered
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the differet masking types?

A

Static data masking - create sanitized copy of the database by altering all sensitive data until a copy database cane be safely shared

Deterministic data masking - map two sets of data that have the same type of data, in such a way that one value is always replaced by another value.

On the fly data masking - masking data while it is transferred from production systems to test or development system,s before the data is saved to disk.

  • Dynamic data masking - similar to on the fly masking, but data is never stored in a secondary data store in the production system and consumed by another system in the dev/test environment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the data masking techniques?

A
Data encryption 
Data scrambling
Nuling out
Value variance
data substitution
data shuffling
Pseusdonymization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data encryption?

A

useless unless the viewer has the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data scrambling?

A

Characters are recognized in random order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is nuling out?

A

missing or null when viewed by unauthorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is value variance?

A

Original data values are replaced by a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data substitution?

A

Fake, but realistic, alternative values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data shuffling?

A

Values are switched within the same dataset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is pseudonymization?

A

Ensures data cannot be used for personal identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is tokenization?

A

it reaplaces a sensitive data element with a non-sensitive substitute, known as a token

  • the token is a randomized data string has no essential or exploitable value or meaning
  • is unique identifier which retains all the pertinent information about the data without compromising its security
  • Links the original data to a token but does not provide any way to decipher the token and reveal the original data.
  • In contrast to encryption systems, which allow data to be deciphered using a secret key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What pseudonymization vs anonymization?

A

Pseudonymization - personally identifiable information fields within a consumer data record are replaced by one or more artificial identifiers, or pseudonyms, which may be recalled at a later date to re-identify the record. This is reversible

Anonymization - either encrypting or removing personally identifiable information from data sets so that the people whom the data describes remain PERMANENTLY anonymous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly