100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIPT Questions and Correct Verified Answers £11.31
Add to cart

Exam (elaborations)

CIPT Questions and Correct Verified Answers

 3 views  0 purchase
  • Module
  • CIPT
  • Institution
  • CIPT

Access Control Entry An element in an access control list. Each ACE controls, monitors, or records access to an object by a specified user. Access Control List A list of access control entries (ACE) that apply to an object. Each ACE controls or monitors access to an object by a specified u...

[Show more]

Preview 4 out of 44  pages

  • November 15, 2024
  • 44
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CIPT
  • CIPT
avatar-seller
Top Mark Questions and Correct Verified Answers



CIPT Questions and Correct Verified
Answers
Access Control Entry


✓ An element in an access control list. Each ACE controls, monitors, or records
access to an object by a specified user.



Access Control List


✓ A list of access control entries (ACE) that apply to an object. Each ACE controls
or monitors access to an object by a specified user. In a discretionary access
control list (DACL), the ACL controls access; in a system access control list
(SACL) the ACL monitors access in a security event log which can comprise part
of an audit trail.



Accountability


✓ A fair information practices principle, it is the idea that when personal
information is to be transferred to another person or organization, the personal
information controller should obtain the consent of the individual or exercise
due diligence and take reasonable steps to ensure that the recipient person or
organization will protect the information consistently with other fair use
principles.



Active Data Collection


✓ When an end user deliberately provides information, typically through the use
of web forms, text boxes, check boxes or radio buttons.



AdChoices




Top Mark !!!

, Top Mark Questions and Correct Verified Answers

✓ A program run by the Digital Advertising Alliance to promote awareness and
choice in advertising for internet users. Websites with ads from participating
DAA members will have an AdChoices icon near advertisements or at the
bottom of their pages. By clicking on the Adchoices icon, users may set
preferences for behavioral advertising on that website or with DAA members
generally across the web.



Adequate Level of Protection


✓ A label that the EU may apply to third-party countries who have committed to
protect data through domestic law making or international commitments.
Conferring of the label requires a proposal by the European Commission, an
Article 29 Working Group Opinion, an opinion of the article 31 Management
Committee, a right of scrutiny by the European Parliament and adoption by the
European Commission.



Advanced Encryption Standard


✓ An encryption algorithm for security sensitive non-classified material by the U.S.
Government. This algorithm was selected in 2001 to replace the previous
algorithm, the Date Encryption Standard (DES), by the National Institute of
Standards and Technology (NIST), a unit of the U.S. Commerce Department,
through an open competition. The winning algorithm (RijnDael, pronounced
rain-dahl), was developed by two Belgian cryptographers, Joan Daemen and
Vincent Rijmen.



Adverse Action


✓ Under the Fair Credit Reporting Act, the term "adverse action" is defined very
broadly to include all business, credit and employment actions affecting
consumers that can be considered to have a negative impact, such as denying or
canceling credit or insurance, or denying employment or promotion. No adverse
action occurs in a credit transaction where the creditor makes a counteroffer
that is accepted by the consumer. Such an action requires that the decision
maker furnish the recipient of the adverse action with a copy of the credit report
leading to the adverse action.



Agile Development Model


Top Mark !!!

, Top Mark Questions and Correct Verified Answers

✓ A process of software system and product design that incorporates new system
requirements during the actual creation of the system, as opposed to the Plan-
Driven Development Model. Agile development takes a given project and
focuses on specific portions to develop one at a time. An example of Agile
development is the Scrum Model.



Anonymization


✓ The process in which individually identifiable data is altered in such a way that it
no longer can be related back to a given individual. Among many techniques,
there are three primary ways that data is anonymized. Suppression is the most
basic version of anonymization and it simply removes some identifying values
from data to reduce its identifiability. Generalization takes specific identifying
values and makes them broader, such as changing a specific age (18) to an age
range (18-24). Noise addition takes identifying values from a given data set and
switches them with identifying values from another individual in that data set.
Note that all of these processes will not guarantee that data is no longer
identifiable and have to be performed in such a way that does not harm the
usability of the data.



Anonymous Data


✓ Data sets that in no way indicate to whom the data belongs. Replacing user
names with unique ID numbers DOES NOT make the data set anonymous even
if identification seems impractical.



Antidiscrimination Laws


✓ Refers to the right of people to be treated equally.



Application-Layer Attacks


✓ Attacks that exploit flaws in the network applications installed on network
servers. Such weaknesses exist in web browsers, e-mail server software,
network routing software and other standard enterprise applications. Regularly
applying patches and updates to applications may help prevent such attacks.




Top Mark !!!

, Top Mark Questions and Correct Verified Answers

Asymmetric Encryption


✓ A form of data encryption that uses two separate but related keys to encrypt
data. The system uses a public key, made available to other parties, and a
private key, which is kept by the first party. Decryption of data encrypted by the
public key requires the use of the private key; decryption of the data encrypted
by the private key requires the public key.



Attribute-Based Access Control


✓ An authorization model that provides dynamic access control by assigning
attributes to the users, the data, and the context in which the user requests
access (also referred to as environmental factors) and analyzes these attributes
together to determine access.



Audit Trail


✓ A chain of electronic activity or sequence of paperwork used to monitor, track,
record, or validate an activity. The term originates in accounting as a reference
to the chain of paperwork used to validate or invalidate accounting entries. It
has since been adapted for more general use in e-commerce, to track customer's
activity, or cyber-security, to investigate cybercrimes.



Authentication


✓ The process by which an entity (such as a person or computer system)
determines whether another entity is who it claims to be. Authentication
identified as an individual based on some credential; i.e. a password, biometrics,
etc. Authentication is different from authorization. Proper authentication
ensures that a person is who he or she claims to be, but it says nothing about the
access rights of the individual.



Authorization




Top Mark !!!

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TopMarks1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £11.31. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£11.31
  • (0)
Add to cart
Added