Risk & Compliance Flashcards
(5 cards)
Vulnerability Assessment vs Pen Testing
Vulnerability Assessment = Scan for known issues
Penetration Testing = Simulate real attacks to find new issues
Example:
VA: Nessus scan
Pen Test: Try to break login with SQL injection
GDPR Basics
What it is: Law protecting EU personal data
3 Principles:
Consent
Right to access/delete
Transparency
Example: User can request deletion of account data
Privacy & Data Protection
What it is: Keeping user data safe and private
Consequences: Data breach → legal fines + loss of trust
Example: App leaks location data → violates privacy law
Secure Software & Work Transformation
Definition: Software built with security from the ground up
Impacts:
Remote work tools = secure access to company systems
New job roles (e.g., cybersecurity analyst)
Intellectual Property in Software
Forms of IP Protection:
Copyright — code
Trademark — logos/UI
Patent — unique algorithms
Trade secrets — internal tools
Example: Google’s PageRank = patented algorithm