Midterm 2 Chapter 12 Flashcards

1
Q

Generally Accepted Privacy Principles

A
  1. Management
  2. Notice
  3. Choice and consent
  4. Collection
  5. Use, retention, and disposal
  6. Access
  7. Disclosure to third parties
  8. Security
  9. Quality
  10. Monitoring and enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between privacy and confidentiality?

A

Privacy: personal information the company collects from suppliers, customers, and employees
Confidentiality: intellectual property that is crucial to the company’s success

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What actions must be taken to protect both confidentiality and privacy?

A
  1. Identify/classify the information to be protected
  2. Encryption
  3. Control access to the information
  4. Train employees to properly handle the information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the strictest and most far-reaching privacy regulation?

A

European Union’s General Data Privacy Regulation (GDRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the GDPR do?

A
  1. Proactive approach to privacy “Privacy by Design”
  2. Requires organizations to notify regulators with 72 hours of discovering a breach
  3. Rights: access to data about you, correction of errors, deletion of personal data, and revocation of consent to sell/share information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity Theft

A

The unauthorized use of someone’s personal information for the perpetrator’s benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

The process of transforming normal content, plaintext, into unreadable gibberish, ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

Transforming ciphertext into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Generally, how does decryption work?

A

The computer first divides the ciphertext into 512-bit blocks and then applies the decryption key to each block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What factors determine the strength of any encryption system?

A
  1. Key length
  2. Encryption algorithm
  3. Policies for managing the cryptographic keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policies for managing the cryptographic keys

A
  1. Don’t store keys in a browser or any other file that other users of the system can readily access
  2. Use a strong/long passphrase to protect the keys
  3. Keys should only be issued to employees who handle sensitive data
  4. Keys should be promptly evoked when an employee leaves or a key has been compromised
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many keys does symmetric encryption have?

A

One key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly