100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
27-11-2024
Geschreven in
2024/2025

CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A)CIPT EXAM QUESTIONS AND ANSWERS (GRADED A) Bastion Server - ANSWER-A server that has 1 purpose and only contains software to support that purpose. E.g. Printer, email, and database servers are bastion servers. Using bastion servers reduces the number of applications on a server, which minimizes vulnerability. Privacy Impact Assessment (PIA) - ANSWER-Checklists or tools to ensure that a personal information system is evaluated for privacy risks and designed with life cycle principles in mind. An effective PIA evaluates the sufficiency of privacy practices and policies with respect to legal, regulatory and industry standards, and maintains consistency between policy and practice. Should be conducted annually, or additionally upon occurrence of any of the following events:

Meer zien Lees minder
Instelling
CIPT
Vak
CIPT










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CIPT
Vak
CIPT

Documentinformatie

Geüpload op
27 november 2024
Aantal pagina's
16
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CIPT EXAM QUESTIONS AND ANSWERS
(GRADED A)
Bastion Server - ANSWER-A server that has 1 purpose and only contains software to
support that purpose.

E.g. Printer, email, and database servers are bastion servers.

Using bastion servers reduces the number of applications on a server, which minimizes
vulnerability.

Privacy Impact Assessment (PIA) - ANSWER-Checklists or tools to ensure that a
personal information system is evaluated for privacy risks and designed with life cycle
principles in mind. An effective PIA evaluates the sufficiency of privacy practices and
policies with respect to legal, regulatory and industry standards, and maintains
consistency between policy and practice.

Should be conducted annually, or additionally upon occurrence of any of the following
events:
-Creation of new product/service
-New/updated program for processing data
-Merger/acquisition
-Creation of new data center
-Onboarding of new data
-Movement of data to different country
-Changes in regulations governing data use

Security Policy Principles - ANSWER-All security policies should include these
EXTERNAL requirements:
(1) Corporate - data stored from consumers, partners, vendors, and employees needs
to be protected in accordance with contracts or privacy policies; also, need to keep data
secure to protect interests.
(2) Regulatory - privacy requirements placed on organizations by government entities
(e.g. FTC, Office of the Information and Privacy Commissioner of Ontario, and the UK
Information Commissioner's Office).
(3) Industry - compliance with different industry groups shows commitment to privacy
principles of that industry, which can avoid creation of new legislation / regulatory
scrutiny.

Industry Groups - ANSWER-Industry group examples = Better Business Bureau,
Interactive Advertising Bureau, TRUSTe, and the Entertainment Software Rating Board.

,Key Security Measures - ANSWER-(1) Encryption - BEST means of protecting data
during transmission and storage; type of encryption should be based on how the
encryption's performance and complexity may impact company system.
(2) Software protection - antivirus software can detect malicious software; packet
filtering can help ensure inappropriate communications packets do not make it onto
company's network.
(3) Access controls - programmatic means for preventing unwanted access to data
hosted; should be continually certified to ensure only appropriate people have access.
(4) Physical protection - all computers should have minimum level of physical security to
prevent outside access (e.g. cameras, guards).
(5) Social engineering prevention - employees should. be trained to detect exploits
where individuals pretend to represent company/person in order to gain access to data.
(ChoicePoint data breach)
(6) Auditing - auditing system should be configured so logs are sent to remote auditing
machine outside the control of the system and application administrators.

Steps for avoiding privacy-invasive applications - ANSWER-(1) Privileged access -
restrictions can be placed on who installs/configures applications;
(2) Software policy - policy that describes requirements/guidelines for applications used
on company computers.
(3) Policy links - for each application that explains privacy obligation and is accessible
via application.
(4) Application research - companies should perform research to determine which
applications are most appropriate for their employees, computers, and networks.
(5) Employee training - employees should be periodically trained on company's software
policy, as well as on threats to privacy from installation of malicious
applications/improper configuration of legitimate apps; yearly privacy training is best
practice.
(5) IT involvement - can have one of two ways: (i) IT controlled - IT dept sets up each
computer, ensuring only specific apps are installed and ensuring apps are periodically
updated as needed or (ii) IT monitored - company computers can be periodically
scanned to validate each installed application is on approved list of apps and has right
version/proper configuration set.
(6) Employee Controlled - companies can let employees manage own computer system
based on corporate policy, as opposed to IT dept governance.

Ways to mitigate network risks - ANSWER-(1) Keep computers clear of malware - run
latest anti-malware software;
(2) Apply smartphone policies - phone passwords, auto-device lock/remote wiping
mechanism enforced for smartphones connecting to network resources;
(3) Validate network devices - each device must come from reputable vendor and have
proper configuration/most recent updates;
(4) Write secure code - developers should follow guidelines on how to write software
that avoids the risk of exposing data over network ("Writing Secure Code" and "The
Open Web Application Security Project");

, (5) Validate applications - all apps running on computers/smartphones should be
restricted from accessing network services unless they are on a safe list set up by IT
dept.
(6) Network encryption - use encryption on wireless/wired networks at transportation
level to mitigate threat of thieves accessing unprotected data.

Network Monitoring - ANSWER-Malware can infect company's network and travel from
computer to computer. Network monitoring software can look for known virus signatures
or use other means to find and cleanse network infestations.

Network monitoring can also prevent private data from leaving company / look for
signatureless advanced malware and take targeted actions.

Hashing - ANSWER-Uses cryptographic key to encrypt data but does not allow data to
be later decrypted - permits use of sensitive data while protecting original value.

Used for credit card numbers or SSN. The downside is that the information can never
be decrypted.

Password control - ANSWER-Single Sign On (SSO) can permit access to multiple
resources from a single account, with ability to centrally lock a person to multiple
resources.

Machine access restriction - ANSWER-Limit access to a computer based on computer
identifier or IP address.

Example: Access to payroll database only limited to set of computers in payroll
department.

Enterprise Architecture (EA) - ANSWER-EA involves managing data flow across an
organization to reduce risk and support business growth.
---Data flow diagram can show origin of data, indicating whether origin was an
individual, external entity, internal group or process.

Data Storage - ANSWER-(1) Files - can be protected outside of their storage system
using password-based encryption or digital rights management;
(2) Websites - Employee access should be limited, and each website should have a
policy link for employees/access control list/organized by category to protect sensitive
content.
(3) Databases - good place to store sensitive data because general access control, role-
based access control, encryption, data categorization, retention management, and
auditing.
(4) Cloud storage - provides better access to data for customers, lower operational
costs, and limits regulatory risks for cross-border transfer of customer data. Contracts
should ensure that the hosting company follows org's data storage policy.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursingTutor1 West Virginia University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1642
Lid sinds
3 jaar
Aantal volgers
1073
Documenten
18066
Laatst verkocht
1 dag geleden
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.8

449 beoordelingen

5
212
4
76
3
90
2
21
1
50

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen