Term
|
Definition
Sensitive Information (know how shortcuts) can't be encrypted Protects information only in specific situations-laptop stolen able or read information Physical Access controls need to be strong-defense in depth, access controls, and training |
|
|
Term
| Information Rights Management |
|
Definition
| provides an additional layer of protection to specific information resources, limits access to specific files but also limit actions (read, copy, print) |
|
|
Term
| Data Loss Prevention Software |
|
Definition
| works like antivirus programs in reverse, blocking outgoing messages that contain key words or phrases associated with the intellectual property or other sensitive data the organization wants to protect. PREVENTIVE MEASURE |
|
|
Term
|
Definition
| supplement data loss prevention software- detective control that enables an organization to identity confidential information that has been disclosed. |
|
|
Term
| What is the most important control for protecting confidentiality? |
|
Definition
| Training- need to know what information they can share, what needs to be protected, how to protect data, logging out at workstations, code reports, don't leave sensitive information in plain view |
|
|
Term
|
Definition
| programs that replace customers personal information with fake values = because programmers should test with real data for security reasons |
|
|
Term
|
Definition
| unsolicited email that contains advertising or offensive content |
|
|
Term
|
Definition
| unauthorized use of someone's personal information for perpetrator's benefit |
|
|
Term
|
Definition
| text file created by a web site and stored on a visitor's hard disk, store information about what user has done on website |
|
|
Term
| What does GAPP include/show? |
|
Definition
| protecting privacy of customers' personal information requires implementing policies, procedures, and technology then training everyone in the organization to follow it and monitor compliance. So managerial issue not just IT |
|
|
Term
|
Definition
| process of transforming normal content, called plaintext into unreadable cipher text |
|
|
Term
|
Definition
| reverses process transformating cipher text into plaintext |
|
|
Term
| What do both encryption and decryption involve? |
|
Definition
| use of key and an algorithm; key is string of binary numbers |
|
|
Term
| 3 factors that influence encryption strength |
|
Definition
| Key length, encryption algorithm, an polices for managing cryptographic keys |
|
|
Term
|
Definition
| involves making copies of all encryption keys used by employees and storing those copies securely |
|
|
Term
| Symmetric Encryption System |
|
Definition
| use the same key to both encrypt and decrypt. Benefits: Faster Problems: two party involvement makes it complete to exchange so need same method, also sep key needs to be made for each party |
|
|
Term
| Asymmetric Encryption System |
|
Definition
| use public key available to everyone and private key which is only known by the owner of that pair of keys |
|
|
Term
|
Definition
| process that takes plaintext of any length and transforms it into a short code called a hash |
|
|
Term
| How is hashing different from encryption? |
|
Definition
| encryption always produces cipher text similar in length to the original plaintext and hashing always produces a hash that is of a fixed short length. 2. encryption is reversible, hashing is not |
|
|
Term
| How can a business obtain same level of assurance about enforceability of a digital transaction that a signed photocopy provides? |
|
Definition
| Use Hashing and Asymmetric Encryption to create a digital signature |
|
|
Term
|
Definition
| hash of a document that is encrypted using the document creator's private key |
|
|
Term
| What do digital signatures provide proof of? |
|
Definition
| copy of a document or file has not been altered and who created the original version of digital document or file |
|
|
Term
| How do digital signatures provide assurance? |
|
Definition
| if two hashes are identical means two documents are identical because has reflects every bit in a document. 2. asymmetric encryption |
|
|
Term
| How can you really be sure of a party's identify with digital signatures? |
|
Definition
| digital certificates and public key infrastructure |
|
|
Term
|
Definition
| electronic document that contains an entity's public key and certifies the identity of the owner of that particular public key |
|
|
Term
| Public Key Infrastructure |
|
Definition
| system for issuing pairs of public and private keys and corresponding digital certificates |
|
|
Term
|
Definition
| privdes the functionality of privately owned secure network without the associated costs of leased telephone lines, satellites, and other communication equipment |
|
|
Term
| What two type soy VPN's do organizations use? |
|
Definition
| SSL and browser software to give employees remote access to the corporate network. 2. IPSec which is a version of the IP protocol that incorporates encryption to securely connect two offices |
|
|
Term
|
Definition
| text files that only store information and can't perform any actions |
|
|
Term
| What 3 controls can protect confidentiality and privacy? |
|
Definition
| encryption, access controls, and training |
|
|
Term
| Difference between US and Europe about collecting customer's personal information? |
|
Definition
| Europe=opt in, US=opt out |
|
|
Term
| One of the ten GAPP principles is concerned with relationship between security and privacy? |
|
Definition
| security is a necessary but not sufficient precondition to protect privacy. security alone is not enough |
|
|
Term
| Input Controls-Form Design |
|
Definition
| Forms should be renumbered and turnaround document |
|
|
Term
|
Definition
| form design, cancellation and storage of source documents, data entry controls, batch processing |
|
|
Term
| Types of Data Entry Controls |
|
Definition
| Field Check, sign check, limit check, range check |
|
|
Term
|
Definition
| tests whether a batch of input data is in the proper numerical or alphabetical sequence |
|
|
Term
|
Definition
| summarize important values for a batch of input records= financial total, hash total, and record count |
|
|
Term
|
Definition
| located at the beginning of each file and contains the file name, expiration date, exc. Part of the file labels |
|
|
Term
|
Definition
| located at the end of the file and contains the batch totals calculated during input. |
|
|
Term
| Recalculation batch totals with a transposition error |
|
Definition
| two adjacent digits were inadvertently reversed. total should be recomputed as each transactions record is processed and the total for the batch should then be compared to the values in the trailer record |
|
|
Term
| Cross footing balance test |
|
Definition
| compares the results produced by each method to verify accuracy |
|
|
Term
| Parity Bit and Parity Checking |
|
Definition
| extra digit added to the beginning of every character that can be used to check transmission accuracy. verify the integrity of data sent and received 2. which entails verifying that the proper number of bits are set tot he value 1 in each character received |
|
|
Term
|
Definition
| ability of a system to continue functioning in the event that a particular component fails |
|
|
Term
| Redundant Arrays of Independent Drives (RAID) |
|
Definition
| data is written to multiple disk drives simultaneously, one drive fails the data can be accessed from another |
|
|
Term
|
Definition
| represents the maximum amount of data that the organization is willing to potentially lose |
|
|
Term
|
Definition
| reprints the length of time that the organization is willing to attempt to function without its information system |
|
|
Term
|
Definition
| application control would detect and prevent entry of alphabetic characters as the price of an inventory item |
|
|
Term
|
Definition
| prevent entry of a nonexistent customer number in a sales transaction |
|
|
Term
|
Definition
| disaster recovery strategy invokes contracting for use of a physical site to which all necessary computing equipment will be delivered within 24 to 36 hours |
|
|
Term
| Incremental backups vs Differential Daily Backups |
|
Definition
| incremental faster but reservation is slower and more complex |
|
|
Term
|
Definition
| information that needs to be stored securely for 10+ years |
|
|