Confidentiality and Privacy Controls
Chapter 9
Copyright © 2015 Pearson Education, Inc. 9-1
Learning Objectives
• Identify and explain controls designed to protect the
confidentiality of sensitive information.
• Identify and explain controls designed to protect the privacy of
customers’ personal information.
• Explain how the two basic types of encryption systems work.
Copyright © 2015 Pearson Education, Inc.
9-2
Protecting Confidentiality and Privacy of Sensitive
Information
• Identify and classify information to protect
• Where is it located and who has access?
• Classify value of information to organization
• Encryption
• Protect information in transit and in storage
• Access controls
• Controlling outgoing information (confidentiality)
• Digital watermarks (confidentiality)
• Data masking (privacy)
• Training
Copyright © 2015 Pearson Education, Inc.
9-3
Generally Accepted Privacy Principles
• Management • Access
▫ Procedures and policies with assigned ▫ Customer should be able to review,
responsibility and accountability correct, or delete information collected on
them
• Notice
▫ Provide notice of privacy policies and • Disclosure to third parties
practices prior to collecting data
• Choice and consent • Security
▫ Opt-in versus opt-out approaches • Protect from loss or unauthorized access
• Collection • Quality
▫ Only collect needed information
• Use and retention • Monitoring and enforcement
▫ Use information only for stated business • Procedures in responding to complaints
purpose • Compliance
Copyright © 2015 Pearson Education, Inc. 9-4
Encryption
• Preventative control
• Factors that influence encryption strength:
▫ Key length (longer = stronger)
▫ Algorithm
▫ Management policies
Stored securely
Copyright © 2015 Pearson Education, Inc. 9-5
Encryption Steps
• Takes plain text and with an
encryption key and algorithm,
converts to unreadable ciphertext
(sender of message)
• To read ciphertext, encryption key
reverses process to make
information readable (receiver of
message)
Copyright © 2015 Pearson Education, Inc. 9-6
Types of Encryption
Symmetric Asymmetric
• Uses one key to encrypt and decrypt • Uses two keys
• Both parties need to know the key ▫ Public—everyone has access
▫ Need to securely communicate the ▫ Private—used to decrypt (only known by
shared key you)
▫ Cannot share key with multiple parties, ▫ Public key can be used by all your
they get their own (different) key from trading partners
the organization • Can create digital signatures
9-7
Copyright © 2015 Pearson Education, Inc.
Virtual Private Network
• Securely transmits encrypted data between sender and receiver
▫ Sender and receiver have the appropriate encryption and decryption
keys.
Copyright © 2015 Pearson Education, Inc.
9-8
Key Terms
• Information rights management (IRM) • Asymmetric encryption systems
• Data loss prevention (DLP) • Public key
• Digital watermark • Private key
• Data masking • Key escrow
• Spam • Hashing
• Identity theft • Hash
• Cookie • Nonrepudiation
• Encryption • Digital signature
• Plaintext • Digital certificate
• Ciphertext • Certificate of authority
• Decryption • Public key infrastructure (PKI)
• Symmetric encryption systems • Virtual private network (VPN)
Copyright © 2015 Pearson Education, Inc. 9-9