2.0 Data & Privacy Flashcards

(22 cards)

1
Q

personally identifiable information (PII)

A

data that could reveal a person’s identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

threat actors

A

cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

identity fraud

A

The invention of fake personal information or the theft and misuse of an individual’s personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

algorithms

A

Operations that transform a plaintext into a ciphertext with cryptographic properties, also called a cipher. There are symmetric, asymmetric, and hash cipher types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cookies

A

A text file used to store information about a user when they visit a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

short message service (SMS)

A

System for sending text messages between cell phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

encryption

A

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of algorithm/cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

End-to-end encryption

A

a method of secure communication that prevents third parties from reading your data while it’s transferred from one system or device to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

File Transfer Protocol (FTP)

A

Application protocol used to transfer files between network hosts. Variants include:
S(ecure)FTP
FTP with SSL (FTPS and FTPES)
T(rivial)FTP
***FTP utilizes ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

artificial intelligence (AI)

A

The science of creating machines with the ability to develop problem-solving and analysis strategies without significant human direction or intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

machine learning (ML)

A

A component of AI that enables a machine to develop strategies for solving a task given a labeled dataset where features have been manually identified but without further explicit instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General Data Protection Regulation (GDPR)

A

Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCPA (California Consumer Privacy Act)

A

The CCPA is a law that helps people living in California know:
WHAT personal information (PII) companies collect about them,
WHY they collect it.
WHO they share it with.
It lets people in California:
SEE their personal information.
ASK for it to be deleted.
SAY NO to having it sold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Health Insurance Portability and Accountability Act (HIPAA)

A

US federal law that protects the storage, reading, modification, and transmission of personal healthcare data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered. Encryption provides for a secure means of transmitting data and authenticating users. It is also used to store data securely. Encryption uses different types of algorithm/cipher and one or more keys. The size of the key is one factor in determining the strength of the encryption product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ciphertext

A

Data that has been enciphered and cannot be read without the cipher key.

16
Q

plaintext

A

Unencrypted data that is meant to be encrypted before it is transmitted, or the result of decryption of encrypted data.

17
Q

Data at rest

A

data is sitting still, saved somewhere such as on a computer or in the cloud.

18
Q

Data in transit

A

data in motion, is when data is moving from one place to another over the Internet or a network.

19
Q

HyperText Transfer Protocol Secure (HTTPS)

A

Application protocol used to provide web content to browsers. HTTP uses port 80. HTTPS(ecure) provides for encrypted transfers, using TLS and port 443.

20
Q

virtual private network (VPN)

A

A secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

21
Q

two-factor authentication (2FA)

A

Strong authentication mechanism that requires a user to submit two different types of credential, such as a fingerprint scan plus PIN. Often, the second credential is transmitted via a second trusted device or account. This is also referred to as 2-step verification.