Please enable JavaScript.
Coggle requires JavaScript to display documents.
4-PRIVACY IN SYSTEMS & APPLICATIONS (5-ENCRYPTION (cryptographic…
4-PRIVACY IN SYSTEMS
& APPLICATIONS
1- ENTERPRISE IT
WNVIRONMENT
architecture considerations
IT involvement through M&A
industry and function specific systems
2- IDENTITY &
ACCESS MANAGEMENT
limitations of access management
as a privacy tool
least privilege required
user based access control
RBAC
context of authority
user to site
user to enterprise
user to multiple enterprises
cross site authentication
& authorization models
3- CREDIT CARD
INFO
cardholder data types
application of PCI DSS
PA DSS
4- REMOTE ACCESS,
TELECOMMUTING, BYOD
privacy & sec considerations
access to computers
IT Architecture controls
5-ENCRYPTION
crypto design &
implementation considerations
application encryption
record vs field encryption
file encryption
disk encryption
encryption regulation
LUKS disk encryption
cryptographic standards
asymettric
symmetric
hashing
encryption regulations
6-OTHER PETs IN THE
ENTERPRISE ENVIRONMENT
automated data retrieval
automated system audits
data masking & obfuscation
data loss prevention (DLP)
7-SOFTWARE NOTIFICATIONS
& AGREEMENTS
just in time notices
website signup screens
software agreements