chapter 9
Across
- 2. / If an organization asks you to disclose your social security number, but fails to establish a set of procedures and policies for protecting your privacy, the organization has likely violated which of the Generally Accepted Privacy Principles?
- 5. / If an organization asks you to disclose your social security number, yet fails to properly dispose of your private information once it has fulfilled its purpose, the organization has likely violated which of the Generally Accepted Privacy Principles?
- 8. / If an organization asks you to disclose your social security number, yet fails to permit you to opt-out before you provide the information, the organization has likely violated which of the Generally Accepted Privacy Principles? (3words)
- 11. / If an organization asks you to disclose your social security number, but fails to tell you about its privacy policies and practices, the organization has likely violated which of the Generally Accepted Privacy Principles?
- 12. / One way to circumvent the counterfeiting of public keys is by using a ________(2words)
- 14. / Information encrypted with the creator's private key that is used to authenticate the sender is digital_________
Down
- 1. / A process that takes plaintext of any length and transforms it into a short code.
- 3. / _________encryption and hashing are used to create digital signatures.
- 4. / The system and processes used to issue and manage asymmetric keys and digital certificates are known as_______(3words)
- 6. / ______encryption systems use the same key to encrypt communications and to decrypt communications?
- 7. / If an organization asks you to disclose your social security number, but decides to use it for a different purpose than the one stated in the organization's privacy policies, the organization has likely violated which of the Generally Accepted Privacy Principles?
- 9. / _______certificate is a electronic document that certifies the identity of the owner of a
- 10. / In a private key system the sender and the receiver have the same key, and in the public key system they have two ________keys.
- 13. / If an organization asks you to disclose your date of birth and your address, but refuses to let you review or correct the information you provided, the organization has likely violated which of the Generally Accepted Privacy Principles?