Term
| Actions that must be taken to preserve confidentiality |
|
Definition
1. identification and classification of the information to be protected 2. encryption of sensitive information 3. controlling access to sensitive information 4. training |
|
|
Term
| Information Rights Management (IRM) software |
|
Definition
| provides an additional layer of protection to specific information resources, offering the capability not only to limit access to specific files or documents, but also to specify the actions (read, copy, print, download, etc.) that individuals can perform |
|
|
Term
| Data Loss Prevention (DLP) software |
|
Definition
| works like and antivirus program in reverse, blocking outgoing message that contain key works or phrases associated with the intellectual property or other sensitive data the organization wants to protect |
|
|
Term
|
Definition
| a detective control that enables an organization to identify confidential information that has been disclosed |
|
|
Term
| Two major privacy-related concerns |
|
Definition
spam: unsolicited e-mail that contains either advertising or offensive content.
Identity Theft: the unauthorized use of someone's personal information for the perpetrator's benefit |
|
|
Term
| 10 best practices identified by GAPP (generally accepted privacy principles) that are internationally recognized |
|
Definition
1. Management 2. Notice 3. Choice and Consent 4. Collection 5. Use and Retention 6. Access 7. Disclosure to Third Parties 8. Security 9. Quality 10. Monitoring and Enforcement |
|
|
Term
| encryption and decryption |
|
Definition
| the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext, and then reversing the process. |
|
|
Term
| Factors that influence encryption strength |
|
Definition
1. Key length 2. Encryption Algorithm 3. Policies for Managing Cryptographic Keys |
|
|
Term
| symmetric encryption systems |
|
Definition
| use the same key both to encrypt and decrypt (DES and AES) |
|
|
Term
| asymmetric encryption systems |
|
Definition
| use two keys. the public key is widely distributed and available to everyone; the private key is kept secret and known only to the owner of that pair of keys (RSA and PGP) |
|
|
Term
|
Definition
| a process that takes plaintext of any length and transforms it into a short code called a hash |
|
|
Term
|
Definition
| a hash of a document that is encrypted using the document creator's private key |
|
|
Term
|
Definition
| an electronic document that contains an entity's public key and certifies the identity of the owner of that particular public key |
|
|
Term
|
Definition
| organization that issues digital certificates |
|
|
Term
| public key infrastructure (PKI) |
|
Definition
| the system for issuing pairs of public and private keys and corresponding digital certificates |
|
|
Term
| virtual private network (VPN) |
|
Definition
| provides the functionality of a privately owned secure network without the associated costs of leased telephone lines, satellites, and other communication equipment |
|
|