Topic 3.3 Confidentiality And Privacy Flashcards

1
Q

It is especially important to encrypt sensitive information in:

A

Databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the privacy controls of security

A

Deals with protecting customer information vs internal company information

Same controls:

  • identification
  • encryption
  • access control
  • training
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are privacy concerns?

A

SPAM
identity theft
Unauthorised use of personal data for perpetrators benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the generally accepted privacy principles

A
  • Management
  • Notice
  • Choice and consent
  • Collection
  • Use, retention, and disposal
  • Access
  • Disclosure to third parties
  • Security
  • Quality
  • Monitoring and enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the factors that influence encryption strength

A
  • Key Length (longer = stronger)
  • Algorithm
  • management policies
  • stored securely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the steps of encryption

A
  • Takes plain text and with an encryption key and algorithm, converts to unreadable cipher text
  • to read cipher text, encryption key reverses process to make information readable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of encryption

A

Symmetric

  • uses one key to encrypt and decrypt
  • both parties need to know the key

Asymmetric

  • public, everyone has access
  • private, used to decrypt
  • public key can be used by all your trading partners
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are digital signatures use?

A

To create a legally binding agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a virtual Private Network do

A

Securely transmits encrypted data between sender and receiver
- sender and receiver have the appropriate encryption keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The batch processing data entry control that sums the number of items in a batch is called

A

Record count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Modest expectations investment services allows customers to manager their investments over the internet. If customers attempt to spend more money than they have in their account, an error message is displayed. This is an example of

A

Reasonableness test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A __________ control ensures that the correct and most current files are being updates

A

File labels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Whose responsibility is it to determine the amount of time an organisation can afford to be without its information system

A

Senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a computer systems files are automatically duplicated on a second data storage system as they are changed, the process is referred to as

A

Real time monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With regards to system’s availability, developing and using multiple components provides an AIS with

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cancellation and storage of documents means

A

Documents are defaced and stored

17
Q

The control that verifies accuracy by comparing two alternative ways of calculating the same total is called

A

Cross footing balance test

18
Q

A _______ determines if all required data items have been entered

A

Completeness check

19
Q

______ is a data entry input control that involves summing the first four digits of a customer number to calculate the value of the fifth digit, then comparing the calculated number to the number entered during data entry

A

Check digit verification

20
Q

Which of the following is an important control to prevent buffet overflow vulnerabilities

A

Size check

21
Q

The maximum acceptable down time after a computer system failure is determined by a company’s

A

Recovery time objective

22
Q

A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as

A

An archive