Week 8 - Confidentiality and Privacy Controls Flashcards

(18 cards)

1
Q

Define confidentiality and privacy controls

A

Measures or mechanisms designed to safeguard sensitive information from unauthorised access, disclosure or modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List confidential and private information of an organisation

A
  • Customer personal information
  • Login details
  • Strategic plans
  • Financial data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What threats does lack of confidentiality and privacy controls introduce

A
  • Identity theft
  • Financial fraud
  • Social engineering and phishing
  • Corporate espionage or insider threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List strategies for preserving confidentiality and privacy

A
  • Data encryption
  • Hashing
  • Staff training
  • Access control
  • Data masking
  • Vendor security assessment
  • Audit trails
  • Digital signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the 2 types of encryption

A
  1. Symmetric
  2. Asymmetric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is symmetric encryption

A

A cryptographic technique that uses the same key to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is asymmetric encryption

A

A cryptographic technique that uses the notion of a key pair; different keys are used for the encryption and decryption process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of symmetric encryption

A
  • Wi-Fi Security
  • File encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are examples of asymmetric encryption

A
  • Email security
  • Digital signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the differentiators between symmetric and asymmetric encryption

A
  • Symmetric - one key; asymmetric - two keys
  • Complexity and speed of execution
  • Length of keys
  • Usage
  • Security
  • Different algorithms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is hashing

A

This is the process of transforming plaintext of any length into a short code called hash
It’s fixed-lenght strings of letters and numbers created using a special algorithm called a hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does hashing preserve confidentiality and privacy

A

It’s a one-way process that prevents access to or tampering with the source data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does staff training ensure the preservation of confidentiality and privacy

A

Ongoing training helps employees recognise phishing, use strong passwords and follow data handling procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does access control entail

A

It ensures that only authorised individuals can access sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is data masking

A

It protects sensitive data by hiding or obfuscating it during testing, training or external sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does vendor security assessment entail

A

Evaluating third-party service providers to ensure they comply with security and privacy standards

17
Q

What are audit trails

A

These are logs that record who accessed what data, when and what actions were taken

18
Q

How do digital signatures preserve privacy and confidentiality

A

They can provide evidence of origin, identity and status of electronic documents, transactions or digital messages