Romney C12: Confidentiality & Privacy Flashcards

1
Q

Basic objective information security

A

preserving the confidentiality of the organization’s intellectual property & similar information share with it by its business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Objectives of confidentiality and privacy

A

protect sensitive information from unauthorized access and disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 basic actions to protect C&P

A
  1. Identify & classify the information to be protected
  2. Encrypt the information
  3. Control access to the information
  4. Train employees to properly handle the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4 basic Actions:

1. Identify & classify information to be protected

A
  • identify where such information resides & who has access to it
  • classify the information in terms of its value to the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 basic actions:

Protecting sensitive information with encryption

A

to protect information in transit over the internet

additional layer of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 basic actions:

Protecting sensitive information with encryption

A

to protect information in transit over the internet

additional layer of protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 basic actions:

Protecting sensitive information with encryption

A

to protect information in transit over the internet
additional layer of protection
only protect when it is stored or being transmitted not during processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 basic actions:

3. Controlling access to sensitive information

A

additional digital physical access controls through:

  • Information rights management (IRM)
  • data loss prevention (DLP)
  • digital watermark
  • data masking
  • tokenization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Information Rights Management (IRM)

A

Offers the capability not only to limit access to specific files or documents but also to specify the actions (read, copy, print etc) that individuals granted access to that resource can perform

Some IRM has the capability to limit access privileges to a specific period of time and to remotely erase protected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Loss Protection

A

Software that works like antivirus program in reverse, blocking outgoing messages (email, IM, etc) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital watermark

A

code embedded in documents that enables an organization to identify confidential information that has been disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data masking

A

protecting privacy by replacing sensitive personal information with fake data. Also called tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tokenization

A

another word for data masking`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Training

A
  • employees need to know what info they can share with outsiders
  • employees need to be taught how to protect sensitive data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy Regulations: The EU’s GDPR & U.S Laws

A
  • Europeans Union’s General Data Privacy Regulation is the strictest & most far-reaching privacy regulations
  • imposes huge fines (up to 4% of global revenues) for issues such as not properly obtaining consent to collect and use personal information or not being able to document that the organization has taken proactive approach to protecting privacy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Other laws and regulations

A

– California Consumer Privacy Act (C CP A) of 2018
– Health Insurance Portability and Accountability Act
(H I P A A)
– Health Information Technology for Economic and
Clinical Health Act (H I T E C H)
– Financial Services Modernization Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Generally Accepted Privacy Principles (AICPA and CICA)

A
  1. Management
  2. Notice
  3. Choice and consent
  4. Collection
  5. Use, retention, disposal
  6. Access
  7. Disclosure to 3rd parties
  8. Security
  9. Quality
  10. Monitoring & enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GAPP: 1. management

A

Organizations need to establish a set of procedures and policies for protecting the privacy of personal info they collect from customers/obtain from 3rd parties

Assign responsibility and accountability for implementing those policies to a specific person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GAPP: 2. Notice

A

provide notice about its privacy policies and practices at or before the time it collects personal info from customers,

notice should clearly explain what info is being collected, the reasons for its collections and how it will be used.

18
Q

GAPP: 3. Choice and Consent

A

explain choices available to people and obtain their consent prior the collection and use of their personal info.

opt out: implicit consent because companies can assume it’s okay to collect and use customers’ personal information unless they explicitly object

opt in: explicit consent because organizations cannot collect and use customers’ personal info unless they explicitly agree to allow such actions

19
Q

GAPP: 4. Collection:

A

Collect need info only to fulfill the purpose stated in its privacy policies
-concern: use of cookies on websites

cookies: a text file created by a website and stored on a visitors hard disk. Store info what the user has done on the site.

20
Q

GAPP: 5. use, retention and disposal

A

use customers’ personal info only in the manner described in their stated privacy policies and retain that info only as long as it is needed to fulfill a legitimate business purpose.

when info is no longer useful, must be disposed in a secure manner.

21
Q

GAPP: 6. Access

A

should provide individuals with the ability to access, review, and correct the personal information stored about them

22
Q

GAPP: 7. Disclosure to 3rd parties

A

should disclose their customers’ personal info to third parties only in the situations and manners described in the organization privacy policies and only to third parties who provide the same level of privacy protection

23
Q

GAPP: 8. Security

A

Take reasonable steps to protect its customers’ personal info from loss/unauthorized disclosure. Must used various preventive, detective and corrective controls

24
Q

GAPP: 9. Quality

A

Organizations should maintain the integrity of their customers’ personal information and employ procedures to ensure it’s reasonable accurate.

25
Q

GAPP: 10. Monitoring and enforcement

A

Organizations must periodically verity that their employees procedures to ensure it’s reasonably accurate

26
Q

Identity theft

A

unauthorized use of someone’s personal information for the perpetrator’s benefit

27
Q

Encryption

A
  • the process of transforming normal content, called plaintext, into unreadable gibberish (ciphertext)

plaintext: normal test that has been encrypted
ciphertext: plaintext transformed into unreadable using gibberish encryption

28
Q

Decryption

A

reverse process - transforming ciphertext back into plaintext

29
Q

Factors that influence encryption strength

A
  1. Key length
  2. Encryption algorithm
  3. Policies for managing cryptographic keys
30
Q

Key length

A

longer keys provide stronger encryption by reducing the number of repeating blocks in the ciphertext

makes it harder to spot patterns in the ciphertext that reflect patterns in the original plaintext.

31
Q

Encryption Algorithm

A
  • formula for using the key to transform the plaintext into ciphertext.

A strong algorithm is difficult to break by using brute-force guessing techniques.

32
Q

Policies for managing cryptographic keys:

A

most vulnerable aspects of encryption system.

- must be stored securely and protected with strong access controls

33
Q

Types of Encryption Systems

A
  1. Symmetric encryption system

2. Asymmetric encryption system

34
Q

symmetric encryption system:

A

use the same key both to encrypt and to decrypt

commonly included in most operating system

35
Q

Asymmetric encryption system:

A

use two keys that are created as a matched pair.
keys called: public key and private key
either the public or the private key can be used to encrypt but only the other matching key can decrypt.
used in combination with a process called hashing to create legally binding digital signatures.

36
Q

public key:

A

widely distributed and made available to everyone

37
Q

private key

A

kept secret and known only to the owner of the pair of keys.

38
Q

key escrow

A

the process of storing a copy of an encryption key in a secure location

39
Q

Two major problems of symmetric:

A
  1. both parties (sender & receiver) need to know the shared secret key
  2. a separate key needs to be created for use by each party with whom the use of encryption is desired.
40
Q

Problems of Asymmetric Encryption System

A

is speed.
much (thousand of times) slower than symmetric encryption, making it impractical to exchange large amounts of data over the internet

41
Q

Virtual Private Networks (VPNs)

A

using encryption and authentication to securely transfer information over the internet, thereby creating a “virtual” private network (sender and receiver have the appropriate encryption and decryption keys)

  • include controls to authenticate the parties exchanging information & to create an audit trail of the exchange
42
Q

Hashing

A

Transforming plaintext of any length into a short code called a hash

this property of hashing algorithms provides a means to test the integrity of a document, to verify whether two copies of a document, each stored in different devices, are identical

ability to verify integrity plays an important role in creating legally binding digital signatures and is an essential component underlying blockchains

43
Q

Digital signatures

A

Used to create a legally binding agreements. (2 steps to create)

  1. document creator uses a hashing algorithm to generate a hash of the original document
  2. document creator uses private key to encrypt step 1 above
44
Q

Blockchain

A

a distributed ledger of hashed documents with copies stored in multiple computers (it cannot be unilaterally altered by one entity)

  • to serve as an audit trail for business process