100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CIPT - Certified Information Privacy Technologist Latest 2023 Graded A

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
20-11-2023
Written in
2023/2024

CIPT - Certified Information Privacy Technologist Latest 2023 Graded A Development Lifecycle Release Planning Definition Development Validation Deployment There are four basic types of countermeasures 1. Preventative - These work by keeping something from happening in the first place. Examples of this include: security awareness training, firewall, anti-virus, security guard and IPS. 2. Reactive - Reactive countermeasures come into effect only after an event has already occurred. 3. Detective - Examples of detective counter measures include: system monitoring, IDS, anti-virus, motion detectors and IPS. 4. Administrative - These controls are the process of developing and ensuring compliance with policy and procedures. These use policy to protect an asset. PCI DSS has three main stages of compliance Collecting and Storing - This involves the secure collection and tamper-proof storage of log data so that it is available for analysis. Reporting - This is the ability to prove compliance should an audit arise. The organization should also show evidence that data protection controls are in place. Monitoring and Alerting - This involves implementing systems to enable administrators to monitor access and usage of data. There should also be evidence that log data is being collected and stored. Re-Identification re-identification refers to using data from a single entity holding the data. Symmetric Encryption Symmetric key cryptography refers to using the same key for encrypting as well as decrypting. It is also referred to as shared secret, secret-key or private key. This key is not distributed, rather is kept secret by the sending and receiving parties Asymmetric Encryption Asymmetric cryptography is also referred to as public-key cryptography. Public key depends on a key pair for the processes of encryption and decryption. Unlike private keys, public keys are distributed freely and publicly. Data that has been encrypted with a public key can only be decrypted with a private key. Choice/Consent Opt-in = requires affirmative consent of individual Opt-out = requires implicit consent of individual Mandatory data collection - necessary to complete the immediate transaction (vs. optional data collection, which will not prevent the transaction from being completed) Choice and consent are regulated by CAN-SPAM Act of 2003, European Data Directive (Articles 7 and 8 De-Identification Process in which sensitive data is treated in such a way that the individual cannot be identified. EULA End-user license agreement (AKA software license agreement) EULA = contract between licensor and purchaser; establishes purchaser's right to use the software Cookies Simple text file that contains name-value pairs. Types of cookies include persistent cookies and session cookies. Cookies can be used for: o Personalization o Session OBA/OBM Online behavioral advertising/online behavioral marketing Via third-party tracking (e.g. web cookie) to collect and compile user information LBS Location-based services Computer program-level services that include controls for location and time data E.g. social networking, entertainment, many via mobile devices Issues: data collection, consent, data sharing P3P Privacy Policies P3P = Platform for Privacy Preferences Project, designed by the World Wide Web Consortium (aka W3C) P3P - a protocol that turns a website's text-based privacy policies into a machinereadable format When must a PIA be conducted Prior to developing or obtaining and IT system or process which collects, stores or discloses personally identifiable information Do Not Track Do Not Track protection is a feature that is being worked on by the World Wide Web Consortium tracking protection working group. The four major browsers - Safari, Firefox, Chrome and Internet Explorer - have incorporated the Do Not Track feature. Site blockers Site blocking tools such as Adblock Plus, DoNotTrackMe and Internet Explorer's tracking protection feature block cookies and the connection between third-party sites and your browser. Browsing anonymity Tor and similar services permit you to browse the internet anonymously. Tor works by directing traffic between two endpoints through multiple intermediate nodes. E-mail anonymity There are several tools like MaskMe and Lockify that allow you to protect your email. MaskMe lets you create a fake e-mail address that you can use when signing up for web services so you won't receive their spam Homomorphic encryption Homomorphic encryption makes it possible to perform mathematical functions on encrypted data. This reduces the risk of data exposure while maintaining its utility Cross-site scripting (XSS Cross-site scripting embeds client-side script into a webpage. The script executes when a user visits the page Spam Spam often refers to legitimate but unwanted e-mail. Spam can also contain phishing, malware or viruses. SQL injection SQL injection is where SQL commands are embedded into a form or website. Pharming Pharming is when a person types a legitimate URL into a browser but is rerouted to a fake website. Whaling Whaling is a type of phishing targeted at people who have lots of money, power or information, such as C-level executives Spear phishing Phishing is where what seems to be reputable company sends an e-mail to an individual with a link that goes to a fake site that looks like a real site. APPEL Application Preference Exchange Language Application Preference Exchange Language, known as APPEL, is a complimentary specification to P3P that enables users to express their privacy preferences in an XML document. B EPAL Enterprise Privacy Authorization Language Enterprise Privacy Authorization Language, known as EPAL, was a language developed by IBM based on the Privacy Rights Markup Language from Zero Knowledge Systems. SAML Security Assertion Markup Language Security Assertion Markup Language, or SAML, is an XML- based format that exchanges data about the identity, attributes and entitlements of an individual to an application or service Pseudonymous Pseudonymous means that while you don't actually know who a person is, you can tell when different pieces of data are about the same unidentified person. Anonymous Anonymous basically means you have no idea who the person is or who the data belongs to, and no way to figure out that information. Basel III Encryption Basel III mandates encryption of financial data for EU companies. HIPAA mandates the encryption of sensitive health information for American companies symmetric encryption Symmetric encryption uses the same key for encrypting and decrypting data. It's a great means for encrypting data that needs to be sent to multiple people. asymmetric encryption or Public Key Asymmetric encryption uses one key for encrypting data and a different key for decrypting the same data. hashing Hashing enables you to encrypt data in a way that can't be decrypted. Web Beacons Web beacons are practically invisible. They are used to either drop web cookies or track individuals using their IP address. Locally shared objects Locally shared objects come in different forms: HTML5 storage, civilized storage and flash storage are a few examples. In Open ID • Open ID is the most common single sign-on mechanism used over the Internet. It is used by LinkedIn, Facebook and Google to provide authentication services Role-based access control Users are placed into security groups that match their roles in the organization, and those groups are provided access to resources. User-based access control user-based access control provides a simple and effective control mechanism. However, an administrator is required to add, edit or remove users or to change access levels. Least privilege access Granting the lowest possible access Choice/Consent Individuals must be able to consent or reject to certain uses of their personal information, particularly with regard to secondary uses and marketing purposes Opt in: Require affirmative consent from the individual. In other words, action must be taken by the individual to START the processing of personal information for secondary uses or disclosures. Opt Out: Requires the implicit consent of the individual. Here consent is assumed because the individual has not stated a desire otherwise. Access/Participation An individual must be able to view the data an entity has on record Integrity/Security Data must be accurate, up-to-date, complete and not stored longer than necessary. Enforcement/Redress An individual must be able to file complaints with the entity have their issues addressed Persistent Data Storage Data stored beyond current transaction Transaction history can be stored and retrieved later Transient Data Storage Data stored for the current transaction, deleted afterwards Fewer privacy implications than persistent storage Anonymity-based techniques Such techniques are focused on making an individual's identity or personal information not identifiable Obfuscation-based techniques In order to make it more difficult to link de-identified information back to individuals, obfuscation-based techniques disguise location and time information by decreasing precision/accuracy and adding confusion to the data. De-identification De-identification refers to the process in which sensitive data is treated in such a way that the individual cannot be identified Data mining Data mining companies will often gather personal information from dentists, doctors, nurses or pharmacists. Privacy by Policy .Notice and choice‖ approach founded on FTC Fair Information Practice Principles • Objectives: o Inform users on data being collected o Present choices for sharing data (e.g. secondary uses of data) o Give users access to data for review/correction/removal purposes o Protect security of data Privacy by Architecture Designs for the non-identifiability of users, provides strong guarantees of privacy Relies on anonymity- and obfuscation-based techniques RSA SecurID Multifactor device, hard or soft token to authenticate Biometric enables users to authenticate themselves to a computer using physical attributes. fingers, eyes, Biometric The more sensitive the system the more false negative the less sensitive the system the more false negative

Show more Read less
Institution
CIPT - Certified Information Privacy Technologist
Course
CIPT - Certified Information Privacy Technologist









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIPT - Certified Information Privacy Technologist
Course
CIPT - Certified Information Privacy Technologist

Document information

Uploaded on
November 20, 2023
Number of pages
13
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StellarScores Western Governers University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1910
Member since
2 year
Number of followers
865
Documents
21115
Last sold
3 days ago
Your Academic Hub: Documents, Study Guides, Summaries, Essays, and Exclusive Package Deals.

Welcome to my comprehensive academic resource store! At my online hub, I offer a vast array of meticulously crafted documents, study guides, summaries, and essays to support your educational journey. I understand the value of accuracy and completeness, which is why all my materials are verified and kept up-to-date with the latest versions. But that's not all! I also offer exclusive package deals and bundles to provide you with cost-effective solutions for your academic needs. Whether you're a student looking for study aids or seeking in-depth knowledge, my store is your one-stop destination for reliable, top-quality materials that can propel your learning experience to new heights. Explore my offerings and unlock the keys to academic success today!

Read more Read less
4.0

442 reviews

5
240
4
79
3
61
2
24
1
38

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions