Topic 3.3 Confidentiality And Privacy Flashcards
It is especially important to encrypt sensitive information in:
Databases
What are the privacy controls of security
Deals with protecting customer information vs internal company information
Same controls:
- identification
- encryption
- access control
- training
What are privacy concerns?
SPAM
identity theft
Unauthorised use of personal data for perpetrators benefit
What are the generally accepted privacy principles
- Management
- Notice
- Choice and consent
- Collection
- Use, retention, and disposal
- Access
- Disclosure to third parties
- Security
- Quality
- Monitoring and enforcement
What are the factors that influence encryption strength
- Key Length (longer = stronger)
- Algorithm
- management policies
- stored securely
What are the steps of encryption
- Takes plain text and with an encryption key and algorithm, converts to unreadable cipher text
- to read cipher text, encryption key reverses process to make information readable
Types of encryption
Symmetric
- uses one key to encrypt and decrypt
- both parties need to know the key
Asymmetric
- public, everyone has access
- private, used to decrypt
- public key can be used by all your trading partners
Why are digital signatures use?
To create a legally binding agreement
What does a virtual Private Network do
Securely transmits encrypted data between sender and receiver
- sender and receiver have the appropriate encryption keys
The batch processing data entry control that sums the number of items in a batch is called
Record count
Modest expectations investment services allows customers to manager their investments over the internet. If customers attempt to spend more money than they have in their account, an error message is displayed. This is an example of
Reasonableness test
A __________ control ensures that the correct and most current files are being updates
File labels
Whose responsibility is it to determine the amount of time an organisation can afford to be without its information system
Senior management
When a computer systems files are automatically duplicated on a second data storage system as they are changed, the process is referred to as
Real time monitoring
With regards to system’s availability, developing and using multiple components provides an AIS with
Fault tolerance