Privacy Technologies Flashcards

1
Q

What is the method and techs that remove identifying information from data before its distributed?

A

Deidentification

Note: Once the personal information is removed, the data can be repurposed for other uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What deidentification method uses generic or placeholder labels to substitute for real data while preserving the original structure or format of the data?

A

Data Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What deidentification method uses a unique token to substitute for the real data?

A

Tokenization

Note: Tokenization is reversible. The real data is replaced with token data, and the real data is stored away in an associated file linked to the token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What deidentification technique generalizes data to protect the individuals involved?

A

Aggregation/Banding

Example: Out of 100 clinical trials, 99 individuals contracted Covid after receiving the vaccine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the attack that combines deidentified dataset with other data sources to determine the level of security with the deidentification method used?

A

Reidentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly