Shared Flashcard Set

Details

Chapter 9
AIS - Chapter 9
16
Accounting
Undergraduate 4
11/05/2013

Additional Accounting Flashcards

 


 

Cards

Term
Actions that must be taken to preserve confidentiality
Definition
1. identification and classification of the information to be protected
2. encryption of sensitive information
3. controlling access to sensitive information
4. training
Term
Information Rights Management (IRM) software
Definition
provides an additional layer of protection to specific information resources, offering the capability not only to limit access to specific files or documents, but also to specify the actions (read, copy, print, download, etc.) that individuals can perform
Term
Data Loss Prevention (DLP) software
Definition
works like and antivirus program in reverse, blocking outgoing message that contain key works or phrases associated with the intellectual property or other sensitive data the organization wants to protect
Term
Digital Watermark
Definition
a detective control that enables an organization to identify confidential information that has been disclosed
Term
Two major privacy-related concerns
Definition
spam: unsolicited e-mail that contains either advertising or offensive content.

Identity Theft: the unauthorized use of someone's personal information for the perpetrator's benefit
Term
10 best practices identified by GAPP (generally accepted privacy principles) that are internationally recognized
Definition
1. Management
2. Notice
3. Choice and Consent
4. Collection
5. Use and Retention
6. Access
7. Disclosure to Third Parties
8. Security
9. Quality
10. Monitoring and Enforcement
Term
encryption and decryption
Definition
the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext, and then reversing the process.
Term
Factors that influence encryption strength
Definition
1. Key length
2. Encryption Algorithm
3. Policies for Managing Cryptographic Keys
Term
symmetric encryption systems
Definition
use the same key both to encrypt and decrypt (DES and AES)
Term
asymmetric encryption systems
Definition
use two keys. the public key is widely distributed and available to everyone; the private key is kept secret and known only to the owner of that pair of keys (RSA and PGP)
Term
Hashing
Definition
a process that takes plaintext of any length and transforms it into a short code called a hash
Term
digital signature
Definition
a hash of a document that is encrypted using the document creator's private key
Term
digital certificate
Definition
an electronic document that contains an entity's public key and certifies the identity of the owner of that particular public key
Term
certificate authority
Definition
organization that issues digital certificates
Term
public key infrastructure (PKI)
Definition
the system for issuing pairs of public and private keys and corresponding digital certificates
Term
virtual private network (VPN)
Definition
provides the functionality of a privately owned secure network without the associated costs of leased telephone lines, satellites, and other communication equipment
Supporting users have an ad free experience!