I-E: The Basics of Privacy Technology Flashcards
(132 cards)
Information Privacy vs. Information Security
Information Privacy - focused on the policies behind handling data
Information Security - focused on the protection of data
What is the CIA Triad?
Information security practices must attempt to balance confidentiality, integrity, and availability of data.
Security practices involve tradeoffs.
Security Control
A measure designed to modify risk.
Can be preventive, detective, or corrective
Can be physical, technical, or administrative.
What are the most widely adopted security standards?
ISO/IEC Standards 27001 and 27002
ISO/IEC Standard 27001
27001 sets forth specific controls (grouped into four categories)
ISO/IEC Standard 27002
27002 provides guidance on implementation of 27001
Privacy Incident
An adverse event or action that is unplanned, unusual, and unwanted that happened as a result of non-compliance with the privacy policies and procedures.
Data Breach
When data is accessed without authorization.
Usually used a legal term as defined in a specific statute.
Information Privacy
Focuses on the policies behind handling information (i.e., the who, what, where, and why of processing personal information).
Privacy is concerned with personal information.
Information Security
The protection of data from unauthorized access.
Security is focused on confidential information.
CIA Triad - Confidentiality
Access to information must only be permitted for authorized persons
E.g., Access control lists, encryption, and file permissions
CIA Triad - Integrity
Information should be kept in a form that is authentic, accurate, and complete
CIA Triad - Availability
Information must be made available when needed.
(i.e., data must be stored and handled in such a way that those who have authorization, and a need to do so, can access it)
Information security programs must:
implement various security controls
ISO defines a “security control” as a:
“measure that is modifying risk,” which can include processes, policies, devices, practices, or other actions.
Security controls aim to:
limit damage, loss, modification, and unauthorized access to data.
Security Control Examples
IT system controls, building security, access control protocols, vendor controls, and third-party mechanisms
Preventative Controls
Seek to prevent a security event from occurring or otherwise prevent errors or other negative consequences.
E.g., prepared statements in software code to prevent SQL injection (a cyberattack)
Detective Controls
Seek to identify a security incident while it is in progress
E.g., active monitoring of closed-circuit televisions
Corrective Controls
Seek to fix or limit the damage caused by a security incident
E.g., data loss protection systems that remotely wipe an employee’s lost hard drive
Physical Controls
Mechanisms designed to limit or monitor physical access to an environment or object
E.g., locks and security cameras
Administrative Controls
Internal procedures and mechanisms put in place to limit and monitor access to information, as well as train employees to follow those internal procedures
Technical Controls
Applications of technology that help protect information against unauthorized access.
4 Technical Control Categories
Obfuscation (e.g., randomization or hashing)
Data Minimization (e.g., data segregation)
Security (e.g., access controls and antivirus software)
Privacy Engineering (e.g., anonymous digital credentials)