Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CIPT - Certified Information Privacy Technologist 2022

Puntuación
-
Vendido
-
Páginas
6
Grado
A+
Subido en
09-10-2022
Escrito en
2022/2023

Development Lifecycle Release Planning Definition Development Validation Deployment There are four basic types of countermeasures 1. Preventative - These work by keeping something from happening in the first place. Examples of this include: security awareness training, firewall, anti-virus, security guard and IPS. 2. Reactive - Reactive countermeasures come into effect only after an event has already occurred. 3. Detective - Examples of detective counter measures include: system monitoring, IDS, anti-virus, motion detectors and IPS. 4. Administrative - These controls are the process of developing and ensuring compliance with policy and procedures. These use policy to protect an asset. PCI DSS has three main stages of compliance Collecting and Storing - This involves the secure collection and tamper-proof storage of log data so that it is available for analysis. Reporting - This is the ability to prove compliance should an audit arise. The organization should also show evidence that data protection controls are in place. Monitoring and Alerting - This involves implementing systems to enable administrators to monitor access and usage of data. There should also be evidence that log data is being collected and stored. Re-Identification re-identification refers to using data from a single entity holding the data. Symmetric Encryption Symmetric key cryptography refers to using the same key for encrypting as well as decrypting. It is also referred to as shared secret, secret-key or private key. This key is not distributed, rather is kept secret by the sending and receiving parties

Mostrar más Leer menos
Institución
Grado

Vista previa del contenido

CIPT - Certified Information Privacy
Technologist
Development Lifecycle - Release Planning
Definition
Development
Validation
Deployment

There are four basic types of countermeasures - 1. Preventative - These work by
keeping something from happening in the
first place. Examples of this include: security awareness training, firewall,
anti-virus, security guard and IPS.
2. Reactive - Reactive countermeasures come into effect only after an event
has already occurred.
3. Detective - Examples of detective counter measures include: system
monitoring, IDS, anti-virus, motion detectors and IPS.
4. Administrative - These controls are the process of developing and
ensuring compliance with policy and procedures. These use policy to
protect an asset.

PCI DSS has three main stages of compliance - Collecting and Storing - This involves
the secure collection and tamper-proof storage
of log data so that it is available for analysis.
Reporting - This is the ability to prove compliance should an audit arise. The
organization should also show evidence that data protection controls are in place.
Monitoring and Alerting - This involves implementing systems to enable
administrators to monitor access and usage of data. There should also be evidence that
log data is being collected and stored.

Re-Identification - re-identification refers to using data from a single entity holding the
data.

Symmetric Encryption - Symmetric key cryptography refers to using the same key for
encrypting as well as
decrypting. It is also referred to as shared secret, secret-key or private key. This key is
not distributed, rather is kept secret by the sending and receiving parties

Asymmetric Encryption - Asymmetric cryptography is also referred to as public-key
cryptography. Public key
depends on a key pair for the processes of encryption and decryption. Unlike private
keys, public keys are distributed freely and publicly. Data that has been encrypted with
a
public key can only be decrypted with a private key.

, Choice/Consent - Opt-in = requires affirmative consent of individual
Opt-out = requires implicit consent of individual
Mandatory data collection - necessary to complete the immediate transaction (vs.
optional data collection, which will not prevent the transaction from being completed)
Choice and consent are regulated by CAN-SPAM Act of 2003, European Data Directive
(Articles 7 and 8

De-Identification - Process in which sensitive data is treated in such a way that the
individual cannot be
identified.

EULA - End-user license agreement (AKA software license agreement)
EULA = contract between licensor and purchaser; establishes purchaser's right to use
the software

Cookies - Simple text file that contains name-value pairs. Types of cookies include
persistent
cookies and session cookies. Cookies can be used for:
o Personalization
o Session

OBA/OBM - Online behavioral advertising/online behavioral marketing
Via third-party tracking (e.g. web cookie) to collect and compile user information

LBS - Location-based services
Computer program-level services that include controls for location and time data
E.g. social networking, entertainment, many via mobile devices
Issues: data collection, consent, data sharing

P3P Privacy Policies - P3P = Platform for Privacy Preferences Project, designed by the
World Wide Web
Consortium (aka W3C)

P3P - a protocol that turns a website's text-based privacy policies into a
machinereadable
format

When must a PIA be conducted - Prior to developing or obtaining and IT system or
process which collects,
stores or discloses personally identifiable information

Do Not Track - Do Not Track protection is a feature that is being worked on by the
World Wide Web Consortium tracking protection working group.

Escuela, estudio y materia

Grado

Información del documento

Subido en
9 de octubre de 2022
Número de páginas
6
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
maxiscore Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
160
Miembro desde
3 año
Número de seguidores
123
Documentos
6957
Última venta
5 meses hace
Exam hub

4.0

40 reseñas

5
20
4
7
3
8
2
2
1
3

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes