Ethics, Trust & Security
Record of actions taken in a system for traceability.
Unauthorized access to data or systems.
User permission for collecting or processing data.
Labeling data by sensitivity.
Collecting only the data you truly need.
How long data is stored before deletion.
Transforming data so only authorized parties can read it.
Investigation to understand what happened in an incident.
Identity and Access Management controlling permissions.
A security or reliability event requiring response.
Information Security Management System.
International standard for information security management.
Principle of granting minimal access required.
Multi-Factor Authentication requiring an additional login factor.
Penetration testing to find security weaknesses.
Personally Identifiable Information.
Protecting personal data and respecting user consent.
Role-Based Access Control: permissions assigned by role.
Protecting systems and data from unauthorized access and harm.
Review of security controls and practices.
Written rules for security practices.
Audit framework for service organizations focusing on trust principles.
Structured analysis of potential attackers and risks.
Transport Layer Security for encrypting data in transit.
A weakness that can be exploited.
