Vocab
Vocab 2
Encryption
Privacy Regs & GAPP
Concepts
100
a text file created by a Web site and stored on a visitor's hard drive.
What is a Cookie?
100
A code embedded in documents that enables an organization to identify confidential information that has been disclosed.
What is Digital Watermark?
100
This is normal content.
What is Plaintext?
100
An organization should provide this about its policies and practices at or before the time it collects personal information about its customers?
What is a Notice?
100
The difference between these two things is that one cannot be reversed.
What is encryption and hashing?
200
This software provides an additional layer of protection to specific files or documents.
What is Information Rights Management?
200
This is the unauthorized use of someones personal information for the perpetrators benefits.
What is Identity Theft?
200
This is unreadable gibberish.
What is Ciphertext?
200
Organizations should explain the choices available to individuals and obtain their consent prior to the collection?
What is Choice and Consent?
200
The most important step in protecting and securing intellectual property.
What is Training?
300
a program that protects privacy by replacing customers personal information with fake values before sending that data to the program development and testing system.
What is data masking?
300
This software, which works like antivirus programs in reverse, blocking out outgoing messages that contains key words or phrases associated with the intellectual property or other sensitive data the organization wants to protect.
What is Date Loss Prevention?
300
This system uses the same key both to encrypt and decrypt.
What is Symmetric encryption systems?
300
Organizations need to establish a set of procedures and policies for protecting the privacy of personal information they collect from customers, as well as information about their customers obtained from third parties such as credit bureaus.
What is Management?
300
This protection of this is a large objective information security.
What is Intellectual Property?
400
A network that controls access to an extranet using encryption and authentication technology.
What is Virtual Private Networks?
400
This is unsolicited e-mail that contains either advertising or offensive content.
What is Spam?
400
This is a process that takes plaintext of any length and transforms it into a short code.
What is Hashing?
400
An organization should assign one or more employees to be responsible for ensuring compliance with its stated privacy policies.
What is Monitoring and Enforcement?
400
These are the strengths of encryption.
What is Key Length, Algorithm, and Policies for Keys?
500
This system for issuing pairs of public and private keys and corresponding digital certificates.
What is Public Key Infrastructure?
500
This is a hash of a document (or file) that is encrypted using the document creator's private key.
What is digital signature?
500
This system uses two keys to encrypt and decrypt.
What is Asymmetric Encryption Systems?
500
Organizations should maintain the integrity of their customers personal information and employ procedures to ensure that it is reasonably accurate.
What is Quality?
500
This type of encryption is faster but less secure.
What is Symmetric Encryption?
M
e
n
u