Chapter 30

Summarize Behavioral Security Concepts

In this chapter, we examine CompTIA IT Fundamentals+ Objective 6.3: Summarize behavioral security concepts. We will cover the following topics:

  • Expectations of privacy when using:

    • The Internet (social networking sites, email, file sharing, instant messaging)

    • Mobile applications

    • Desktop software

    • Business software

    • Corporate network

  • Written policies and procedures

  • Handling of confidential information (passwords, personal information, customer information, company confidential information)

Foundation Topics

Expectations of Privacy When Using…

Computers and computing devices make gathering, using, and sharing information far easier than in the days of typewriters, postal mail, telephones, and telegrams. However, with greater speed and easier use of information, the possibilities of keeping what we gather, use, share, and store private are harder to realize. In the following sections, we examine what levels of privacy we can expect with different types of computer and software use.

The Internet

The Internet, the “network of networks,” connects computers and devices around the world with each other and also represents the biggest threat to privacy for everyone who uses it or has their information placed on it.

Image

While an increasing number of websites now support secure connections using the HTTPS protocol instead of the insecure HTTP protocol, privacy threats come from some websites in the form of tracking cookies.

Note

To learn more about HTTP, HTTPS, and other web protocols, see “Basic Protocols,” Chapter 14, p.280.

Searches for products and services with leading browsers and search engines typically store tracking cookies on your system. These tracking cookies are used to deliver targeted ads in news and information websites and can be used by malware to record and send your search history to hackers.

Depending on the browser, you might be able to block cookies from specific websites, allow cookies from specific websites, clear cookies when you close the browser, block all cookies, or block third-party cookies.

Here’s how to access cookie settings on leading browsers:

  • Google Chrome: Enter chrome://settings/content/cookies into the address window.

  • Opera: Open the Menu tab, scroll down to Cookies.

  • Firefox: Open the menu (three-line icon), click Options, click Privacy & Security, scroll down to Cookies and Site Data.

  • Internet Explorer: Open the menu (gearbox icon), click Internet Options, click the Privacy tab, click Sites (to change cookie settings for specific sites) or Advanced (to configure general cookie settings).

  • Edge: Open the menu (three-dot icon), click View Advanced Settings, scroll down to Cookies.

  • Safari: Click the Safari button in the menu bar, click Preferences, click Privacy, scroll down to the Block Cookies section.

Image

E-commerce websites that are not adequately protected against attack can expose your personal information to theft. It’s not unusual for some credit and debit card users to need to replace their cards several times a year due to identity theft threats against retailers and e-commerce sites.

Many governments track web usage and take actions against users they suspect of performing anti-government activities.

To achieve a reasonable level of Internet privacy, users need to take steps such as the following:

Image
Social Networking Sites

Social networking sites such as Facebook and Twitter make it easy to share information with friends and followers, respectively, but users should not believe that their posted information won’t go any further. A number of court cases have held that posting something on social media means that you are waiving your expectation of privacy for that photo, text, meme, or quote. You should expect that material on social media could be viewed or read by anyone—not just those on that platform, but anyone in the world.

How can you continue to enjoy social networking without revealing too much about yourself? Here are a few tips: Don’t overshare about your life; tweak the privacy settings in your social networking apps; don’t overshare about your work; make sure you know who the connection really is; and don’t get duped by impersonators. For more details and more tips, see https://www.nortonsecurityonline.com/security-center/15-social-networking-safety-tips.html.

Note

See the article “Do you have privacy rights on social media?” from the Internet Law Twists & Turns blog for court cases and insights: https://www.thompsoncoburn.com/insights/blogs/internet-law-twists-turns/post/2016-07-12/do-you-have-privacy-rights-on-social-media-.

Email

The expectation of privacy in email can be divided into two sections: the routing information and the content. Just as with telephone numbers and postal mail addresses, the to and from information and other information used to route a message can’t be expected to be private.

However, the contents of an email message that have been sent can be generally expected to remain private until delivered. Of course, the receiver may distribute the contents of an email if desired. To ensure the privacy of email during transit, use a secure email protocol such as Secure Sockets Layer/Transport Layer Security (SSL/TLS).

A major exception to the privacy expectations of email contents takes place when a corporate, education, or business network or email system reminds users at logon that their use of the network or email system is monitored. Public Internet access via Wi-Fi at kiosks, libraries, coffee shops, hotels, airports, and business centers often uses captive portals for free access. To use Wi-Fi Internet access, you must agree to the provider’s accepted use policies, which frequently include provisions for monitoring.

Note

See the article “Reasonable expectation of privacy” from the IT Law Wiki for citations of court cases: http://itlaw.wikia.com/wiki/Reasonable_expectation_of_privacy.

File Sharing

Any type of file sharing has some potential privacy risks. Software as a Service (SaaS) services such as Dropbox and OneDrive take care of the infrastructure needed for cloud file sharing, but the organization is still responsible for people and data issues.

Image

Some of the people issues that cloud file sharing can have include insider threats, phishing attacks, and what happens if an authorized user’s credentials are lost or compromised. Data issues can include malware, which can be spread to all users of an organization’s shared cloud storage; how to classify data; file permissions; and encryption.

To help organizations protect their cloud file sharing assets, some companies such as Trend Micro, Symantec, and others now offer cloud security services that work in a similar fashion to local or network security apps. For companies that use multiple products from third-party vendors to protect their local and network files and want to use the same apps, Avanan has partnered with dozens of security vendors (anti-malware, encryption, and so on) to enable cloud storage users to assemble a customized cloud file sharing security stack.

Note

To learn more about Trend Micro’s cloud security, see https://www.trendmicro.com/en_us/business/products/user-protection/sps/email-and-collaboration/cloud-app-security.html. To learn more about Symantec’s cloud security, see https://www.symantec.com/solutions/cloud-security. To learn more about Avanan, see https://www.avanan.com/resources/saas-file-sharing-security.

Another threat to privacy is the use of P2P file-sharing (peer-to-peer) services such as Gnutella, BitTorrent, and others. These are often used for illegal downloads, although some organizations also use them for faster downloading of large files such as Linux distributions.

Image

If illegal downloads are shared over a corporate network, users can put a company in legal jeopardy, and many P2P apps make it easy to share folders that contain confidential information with other users. P2P is useful in creating mesh-type network services, but if P2P is used for file sharing, it can threaten privacy. For more, see https://www.cio.com/article/2436917/security0/stop-that-attack--blocking-and-stopping-network-intruders.html and https://www.csoonline.com/article/3030711/security/current-p2p-trends-threatening-enterprise-security.html.

File sharing using built-in operating system features can also be a security risk. With some operating systems, it is possible to disable password-protected file sharing. However, this is very risky and is not recommended. To share folders with other users, you must create an account for each user on a system.

Windows 10 formerly included HomeGroup file sharing, in which a single password was used to permit sharing with several users. Starting with the 1803 (spring 2018) release, HomeGroup is gone. Users who want to share a folder or file must select specifically what to share and with whom. See https://support.microsoft.com/en-us/help/4092694/windows-10-changes-to-file-sharing-over-a-network for more information.

Computers running macOS can share folders with other macOS users and with users of other operating systems such as Windows. For details, see https://support.apple.com/en-us/HT204445 or https://www.lifewire.com/set-up-macs-file-sharing-options-2260207.

Computers running Linux should have Samba installed to make file/folder sharing with Windows and macOS computers easy. To learn more, see https://www.networkworld.com/article/3269189/linux/sharing-files-between-linux-and-windows.html. For more about Samba, see https://www.samba.org/.

For truly secure file sharing, consider one of the following methods:

  • PGP (Pretty Good Privacy), OpenPGP, and GnuPG use public key cryptography to send and receive files securely. See https://www.openpgp.org/ and https://gnupg.org/ for more information.

  • Use encrypted instant messaging (IM) apps. If your current IM app does not support encryption, consider using OTR (Off the Record) messaging, which can be added to some existing IM apps (https://otr.cypherpunks.ca/), or switch to IM apps that do support encryption.

  • Create one-time pads for use by the sender and receiver of a message. A one-time pad is a random pre-shared key containing the same or longer amounts of random characters used to encrypt the message. The message can only be deciphered by someone with the same one-time pad. This method has been widely used in espionage. To learn more, see http://users.telenet.be/d.rijmenants/en/onetimepad.htm.

  • Use secure file transfer methods such as Secure Shell (SSH) or Secure File Transfer Protocol (SFTP). SSH, which creates a secure tunnel over a public network for transferring confidential information, can also be used for secure remote control.

To learn more about these and other methods, see https://www.techradar.com/news/best-ways-to-share-files-securely.

Instant Messaging
Image

Instant messaging (IM) might seem like a chat between friends over a backyard fence, but it can lead to privacy issues because instant messages don’t vanish when they’re received. They stay around on the sender’s device, receiver’s device, and may be stored for some period of time by the messaging provider. If an instant message has revealed something that should have been kept private or confidential, more people than the sender and receiver could read it.

Users of IM apps should be just as careful about what they send and whom they send it to as with email or other communications. Keep in mind that spam exists in the IM world as well as in email. SPIM (spam IM) can be used to send malware, pornographic links, or other undesirable material. Ways to fight back against SPIM include accepting messages only from your contact list, using spam blockers on corporate networks, and reporting spam text messages. See https://zamparoblog.wordpress.com/2016/01/05/stopping-scam-and-spam-phone-calls-and-text-messages/.

Some IM apps include additional privacy and security features, such as encryption, screenshot warning or blocking, and self-destructing messages. Pryvate (https://www.pryvatenow.com/#Home), Wire* (https://wire.com), Wickr* (https://wickr.com/), Telegram*^ (https://telegram.org/), Signal*^ (https://signal.org/), and Confide*^ (https://getconfide.com/) are some of the IM apps you can choose from. A self-destructing message is a message that will delete itself after the message is opened and read. It might use a timer that counts down from the time the message was opened or from the time the message was sent to determine when to destroy the message.

*Free version available

^Also available for desktop

Note

For more about privacy and other legal issues that can be caused by careless use of IM, see http://www.simplexpayroll.com/blog/2016/03/instant-messaging-legal-issues-five-legal-concerns-with-instant-messaging/.

Mobile Applications

Most mobile apps are free, and some cost just a few dollars to license. In exchange for free or low-cost access, mobile apps require access to a lot of your device’s features. Some of the permissions mobile apps require could compromise your privacy. Here are some examples from an Android smartphone:

Image
  • Angry Birds Space (game): Contacts

  • AT&T Maps (directions): Contacts, Location, Microphone, Phone, and SMS

  • Google Chrome (web browser): Camera, Contacts, Location, Microphone, and Storage

  • CVS (shopping): Camera, Contacts, Location, Microphone, and Storage

  • Schnucks (shopping): Camera, Location, and Storage

As you review the permissions list for an app, you might ask yourself, “Why does a shopping app need access to my contacts?”

If you are concerned about privacy, take a careful look at the list of app permissions before you install a mobile app. According to a report by the Pew Research Center in 2015, six out of ten smartphone users surveyed decided not to install an app because of the permissions it needed, and 43% of those surveyed uninstalled an app because of the permissions it used.

What can you do about permissions that can affect your privacy after a mobile app is installed?

iOS users can download the MyPermissions Privacy Cleaner from the App Store to view and fix privacy issues for already-installed apps. Learn more at https://itunes.apple.com/us/app/mypermissions-privacy-cleaner/id535720736.

Mobile devices running Android 6.0 and above can adjust app permissions by following the steps available at https://support.google.com/googleplay/answer/6270602?hl=en.

Note

To help you understand app permissions and how to determine if an app is asking for permissions beyond what it needs, see https://lifehacker.com/5991099/why-does-this-android-app-need-so-many-permissions.

IT departments can use mobile device management (MDM) software to monitor what mobile devices are doing, manage them, and keep them secure. MDM can work with a mix of providers and devices that use different mobile operating systems.

IT departments can also manage and enable apps on both corporate and end-user-owned mobile devices used in a particular organization by using mobile application management (MAM).

MAM vendor Arxan recommends seven best practices for mobile application security. Here are some highlights:

  • Implement security measures at the application layer.

  • Don’t limit tools to anti-malware.

  • Only download apps from trusted enterprise app stores.

  • Ensure the app does not save passwords.

  • Encrypt data in transit.

  • “Listen” to the traffic that flows between the mobile app and the web server.

  • Contain critical corporate data.

For details, see https://www.arxan.com/arxan-blog/7-best-practices-for-mobile-application-security.

Desktop Software

Desktop software might seem more private than mobile devices, but users must use several techniques to make a reasonable expectation of privacy a reality. Some of the methods to use include the following:

Desktop software also requires permissions to operate. How permissions are assigned varies greatly among operating systems. To learn more about how Windows, macOS, and Linux assign file permissions, see “Permissions,” p.359, in Chapter 17.

Microsoft Store
Image

When you view an app on the Microsoft Store, scroll down to the This app can section to see what the app will have permission to do if you install it. Here are some examples:

Grammarly (grammar checker):

  • See the websites you visit

  • Read and change info on sites you visit

  • Read and change anything you send or receive from websites

  • Store personal browsing data on your device

The Grammarly app page did not have a link to the vendor’s privacy policy.

WhatsApp Desktop (chatting):

  • Uses all system resources

The WhatsApp Desktop app page has a link to the vendor’s privacy policy.

Skype (voice, text, video chat):

  • Use your web cam

  • Use your microphone

  • Use your contacts

  • Access your Internet connect ion

  • Access your home or work networks

  • Read and delete text messages

  • Access all the phone lines on your device

  • Use your device’s voice over IP (VoIP) services

  • Background VolP

  • Read contact information

  • Query software licensing policies

  • Access your settings from when you first signed in to your device

  • Access your Windows Phone identification data

  • Have control over your Windows Phone

  • Make use of SMS and RCS

  • Send SMS and MMS messages

  • Read and write all SMS and MMS messages

  • Project the screen on another device

  • Human Interface Device (HID) Telephony

  • xboxTrackingStream

  • Use your devices that support the HID protocol

Note

To see the full list of permissions for an app, click the More link after the list of displayed permissions.

App Store (macOS)

App Store apps are not granted permissions by default. App Store apps request individual permissions to use system features such as Location, Contacts, and so on as they run. The user grants or denies each permission, and users can view or change permissions by opening System Preferences, Security & Privacy. For more information, see https://apple.stackexchange.com/questions/252154/how-can-i-check-what-permissions-an-app-store-app-will-be-granted.

Linux

Linux supports file permissions but does not have a standardized way to view or control app permissions. The Flatpak application sandboxing and distribution framework provides this support starting with version 1.0. Flatpak also enables hosted apps (available at https://flathub.org/home) to be installed on any Linux distribution. To learn more about Flatpak, see https://www.linuxuprising.com/2018/08/linux-application-sandboxing-and.html. The official Flatpak website is https://flatpak.org/.

Business Software

Business software’s principle privacy issues revolve around the storage of personally identifiable information (PII) in a file’s metadata. What is PII? PII is information that can be used to determine a person’s location, identity, contact information, or context (the organization the person is involved in and so on).

Image

Metadata is data about data. For example, the metadata in a file is information about the app or device that created it; the date and time it was created, last modified, or last viewed; keywords; author; number of words; print dimensions; and much more.

Some metadata is visible and easily modified. For example, the Info tab of Microsoft Word or other Office apps’ File menu lists many file properties that can be added to or changed (see Figure 30-1). The Check for Issues menu shown in Figure 30-1 is the gateway to the Document Inspector shown in Figure 30-4.

A screenshot of the File dialog box in Microsoft Word is shown.
Figure 30-1 Working with Document Properties in a Microsoft Word File

To view the metadata in a PDF file using Adobe Acrobat, open File, Properties, Description, Additional Metadata (see Figure 30-2).

A screenshot of the window displaying the additional Metadata stored in a PDF (Adobe Acrobat) File is shown.
Figure 30-2 Additional Metadata Stored in a PDF (Adobe Acrobat) File

To see the exposure and camera metadata for a digital photo, examine the photo’s details (see Figure 30-3).

Two screenshots of the Windows Live Photo Gallery page and the Image properties sheet are shown.
Figure 30-3 Viewing Camera and Exposure Metadata for a Digital Photo in Windows 10

What many users do not know about metadata is that information such as hidden text is also stored in a document’s metadata. For example, an earlier draft of a report critical of a company decision might contain a phrase such as “The head of Department X is a complete fool and should be fired yesterday.” Upon reflection, the writer of the report decided to hide that sentence and replace it with “The head of Department X made an unwise decision.”

As a document is saved, the later version with the more diplomatic language replaces the earlier version in the visible version of the document. However, the hidden text is still stored in the document.

If the document is sent out unchanged, the hidden text can be revealed and the writer of the letter could be fired. To clean up metadata, use the Document Inspector option and remove hidden text, author, and other data (see Figure 30-4).

Note

To learn more about the metadata removal process in Microsoft Word, see https://www.technipages.com/word-how-to-hide-or-unhide-text. To learn about apps and services that can be used to remove or extract metadata from Office, PDF, and other types of files, see http://forensicswiki.org/wiki/Document_Metadata_Extraction.

A screenshot of the Microsoft Word page listing steps to remove Hidden text using Document Inspector is shown.
Figure 30-4 Preparing to Remove Hidden Text (Dotted Line) with the Document Inspector in Microsoft Word

Corporate Network

Image

According to the Privacy Rights Clearinghouse’s Workplace Privacy and Employee Monitoring report (https://www.privacyrights.org/consumer-guides/workplace-privacy-and-employee-monitoring), most corporations monitor employee communications and email over networks and other means (telephones, mobile devices). There have been a number of lawsuits over employee privacy involving computers and email, but results have varied due to the differences in each case. Additional cases are cited in the following articles:

In general, unless a legally binding policy of employee privacy has been provided by the employer, employees should not regard email, instant messaging, or other computer or device uses as private.

Written Policies and Procedures

Part of the controversy over privacy expectations in the workplace revolves around whether a specific employer has developed and communicated policies governing workplace privacy issues. Most organizations have an acceptable use policy (AUP) that employees, associates, or students must sign as a condition of getting network access. The AUP defines what users are permitted to do or banned from doing with the organization’s network or Internet access and might also specify what steps to take in the event of other employees’ misuse of devices or if a virus or malware is detected. If an AUP is not signed and the employee uses the network or the Internet, or if the AUP does not clearly provide rules on Internet and network access, privacy issues can result. See https://www.lifewire.com/acceptable-use-policy-aup-817563 for more about AUPs.

Note

Some organizations might also require employees to sign a nondisclosure agreement (NDA). An NDA is a legal contract that specifies what confidential information can be shared between the organization and employee but cannot be passed to a third party. These are common in technology, medicine, and other types of organizations. See https://whatis.techtarget.com/definition/non-disclosure-agreement for more about NDAs.

If an AUP needs to be developed or revised, here are some of the issues that should be included in such policies:

Image
  • Rules regarding employee email use

  • Whether employees can use company-owned equipment for shopping, email, or other personal tasks

  • When employees can use company-owned equipment (lunches, breaks)

  • Use of personal devices (bring your own device, or BYOD) such as smartphones and tablets for company work

  • What state law might require you to include

There are many sources for workplace privacy templates that can be used to create a privacy policy. Take a look at the following resources for information that can be helpful in creating or updating an employee privacy policy:

Handling of Confidential Information

The handling of confidential information safely is a critical part of any organization’s IT functions. Mishandled information can result in widespread identity theft, loss of company secrets, and many more bad consequences.

Some general procedures help protect confidential information of any type; these procedures include the following:

Image
  • Don’t download or open emails with unexpected attachments.

  • Use password-protected screensavers or lock screens when a device is not in use or if the user is not present.

  • Use network storage for backups.

  • Make sure all updates for the operating system, apps, and other functions are installed. This might require the user to log off.

  • Make sure users are trained in security issues that concern their work.

Passwords

Without an enforceable password policy, employees are likely to use the easiest-to-memorize (and easiest-to-guess) and shortest passwords possible. Password policies should cover minimum length, complexity requirements, periodic password changes, and whether and when old passwords can be changed. For more information, see Chapter 32, “Explain Password Best Practices.”

Personal Information

Image

What is personal information? Personal information is information about a specific individual, such as full name and nickname(s), address, telephone or mobile number, email, citizenship, employment status, salary, department, photo, credit ratings, and similar. If this information is compromised, an individual could be targeted for identity theft, robbery, assault, or other crimes.

Personal information, as well as customer information and company confidential information, should be accessible only on a “need to know” basis, should be stored on a secure network server, and should never be stored on mobile devices unless strong encryption is used to protect the contents. As an alternative to storing information on mobile devices, use a virtual private network (VPN) with two-factor authentication to permit secure remote access if necessary.

Printed information of these types should be stored securely and shredded when it is no longer needed.

Customer Information

Image

What is customer information? Customer information is information held by an organization about its current, former, and prospective customers. This information could include company name, contact information, customer address, phone and mobile numbers, email addresses, fax number, country, purchasing history, current proposals, and more. If this information is compromised, other companies could use it to attempt to take away your customers by spreading rumors, changing pricing or terms, or in other ways.

Company Confidential Information

Image

What is company confidential information? It is information that a company uses to conduct its business, such as trade secrets, processes, sales, purchases, customer lists, accounting data, and more. For a more complete definition, see https://www.law.cornell.edu/cfr/text/19/201.6.

Here is a selection of policies that provide more detail in protecting all types of confidential data:

Image

Exam Preparation Tasks

Review All Key Topics

Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 30-1 lists these key topics and the page number on which each is found.

Image

Table 30-1 Key Topics for Chapter 30

Key Topic Element

Description

Page Number

Paragraph

Privacy threats from web searches

615

Paragraph

Privacy threats from e-commerce

616

List

Methods to help provide Internet privacy

616

Paragraph

Threats to privacy from cloud file sharing

618

Paragraph

Threats to privacy from P2P file sharing

619

Paragraph

Threats to privacy from instant messaging

620

List

Examples of permissions from Android mobile apps

621

List

Examples of permissions from Microsoft Store apps

624

Paragraph

Examples of metadata

626

Paragraph

Corporate network policies

629

List

Examples of workplace privacy rules

630

List

Examples of proper handling of confidential information

631

List

Examples of confidential data-handling policies

631

Paragraph

Examples of customer information

632

Paragraph

Examples of ompany confidential information

632

List

Exmples of protecting confidential information

632

Define Key Terms

Define the following key terms from this chapter and check your answers in the glossary:

Privacy

tracking cookies

virtual private networking (VPN)

single-use credit cards

Apple Pay

Google Pay

social networking

expectation of privacy

SaaS

cloud file sharing

P2P file sharing

instant messaging

mobile apps

permissions

personally identifiable information (PII)

metadata

personal information

customer information

company confidential information

Practice Questions for Objective 6.3

1. Your company makes the world’s crispiest breakfast cereal based on a secret formula. What is this an example of?

  1. Customer information

  2. Personal information

  3. Metadata

  4. Company confidential information

2. You are preparing to submit a digital photo to a photo contest and you don’t want to reveal the camera and lens you used. Which of the following do you need to remove from the file?

  1. Personal information

  2. Metadata

  3. Permissions

  4. Company confidential information

3. Before you install a mobile app, you notice that the app wants to access your contact list and GPS navigation. These are examples of which of the following?

  1. Personal information

  2. Permissions

  3. File sharing

  4. Privacy

4. You need to work remotely using a public Internet connection at a coffee shop. Which of the following should you use to make a secure connection?

  1. Virtual private network

  2. P2P network

  3. Social networking

  4. Dropbox

5. You are using a P2P file-sharing service to download a Linux distribution. You notice that in addition to the Linux installation files on the remote server, you can also see files such as Salesforecast2019.xlsx and SuperCrispv2.pptx. If you download these files, you might be downloading what type of information?

  1. Customer information

  2. Company confidential information

  3. Metadata

  4. Personal information

6. You want to use IM to communicate breaking news to your company’s sales force. However, you want to make sure the messages are removed after 72 hours. Which of the following features does your IM service need to support?

  1. Self-destructing messages

  2. Encryption

  3. Screenshot blocking

  4. Voice chat

7. Some of your co-workers using macOS computers are complaining about app permission settings. Which of the following do they need to use to view and change permissions?

  1. Settings

  2. System Preferences, Security & Privacy

  3. App Store

  4. Finder

8. HR has received an email claiming to be from the company’s CEO asking for the names, contact information, and social security numbers of its food scientists. The email is a phishing email that is attempting to compromise personal information. What else might the email be attempting to compromise?

  1. Metadata

  2. Customer information

  3. Permissions

  4. Company confidential information

9. You are part of a task force developing a privacy policy for your company. Which of the following do you need to add to the policy to cover personal smartphone usage?

  1. BYOD policy

  2. BYOB policy

  3. Permissions policy

  4. IM policy

10. Which of the following represents information that can be used to identify a person that is stored in a file’s metadata?

  1. SPIM

  2. MDM

  3. MAM

  4. PII

11. Which of the following is an alias for a regular credit card number that can be used one time for online purchases?

  1. Apply Pay

  2. Single-use credit card

  3. Single sign-on payment

  4. Google Pay

12. Which of the following is a legal test used to determine how the Fourth Amendment of the U.S. Constitution applies to a particular issue of privacy, such as employee privacy?

  1. Expectation of privacy

  2. Permissions based on need to know

  3. Permissions based on least privilege

  4. Intrusion prevention system test

13. Which of the following is a file stored on a computer or device by a website a computer or device visited and can be used for targeted ads and to track where a user goes online?

  1. Location data executable

  2. Single-use applet

  3. Tracking cookie

  4. Metadata file

14. What can iOS users download from the App Store to view and fix privacy issues for already installed apps?

  1. Location tracking remover

  2. MyPermissions Privacy Cleaner

  3. Apple App Privacy Filter (AAPF)

  4. Personal information eraser

15. You have just been hired as a Certified Information Privacy Technologist. Before you start your new job, you have been asked to sign a document stipulating constraints and practices that you must agree to before accessing the corporate network. What is this document called?

  1. AUP

  2. NDA

  3. EULA

  4. PIIA

16. Which of the following is a network protocol that establishes a secure tunnel allowing remote users to log in securely?

  1. MDM

  2. SSH

  3. HTTP

  4. One-time pad (OTP)

Your Next Steps (More Certs)

Want to specialize in keeping private information private? Check out the Certified Information Privacy Technologist (CIPT) certification program from the International Association of Privacy Professionals (IAPP). Learn more at https://iapp.org/certify/cipt/.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset