Controls for Transmitting Personal Information Across Networks | CISM Exam Answer | ISACA

Adequate Controls for Transmitting Personal Information Across Networks

Prev Question Next Question

Question

When personal information is transmitted across networks, there MUST be adequate controls over:

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

Privacy protection is necessary to ensure that the receiving party has the appropriate level of protection of personal data.

Change management primarily protects only the information, not the privacy of the individuals.

Consent is one of the protections that is frequently, but not always, required.

Encryption is a method of achieving the actual control, but controls over the devices may not ensure adequate privacy protection and, therefore, is a partial answer.

The correct answer is D: encryption devices.

When personal information is transmitted across networks, it is vulnerable to interception, eavesdropping, and tampering by unauthorized entities. To prevent such risks, adequate controls must be implemented to ensure the confidentiality, integrity, and availability of the data.

Encryption is a widely used technique to protect data in transit. It involves transforming the plain text data into cipher text using an encryption algorithm and a secret key, which makes it unreadable to anyone without the key. This ensures that even if the data is intercepted, it cannot be read or tampered with.

Therefore, the use of encryption devices is essential to secure the transmission of personal information across networks. These devices can be hardware or software-based, and they must be properly configured, updated, and maintained to ensure their effectiveness. Additionally, strong encryption keys and protocols must be used to prevent brute force attacks and other forms of cryptographic attacks.

Change management, privacy protection, and consent to data transfer are also important aspects of information security. However, they are not directly related to the protection of personal information during transmission across networks. Change management involves controlling changes to systems and processes to ensure their stability and security. Privacy protection involves protecting personal information from unauthorized access, use, or disclosure. Consent to data transfer involves obtaining the user's consent before transferring their personal information to another entity. These controls are important in the overall management of personal information, but they do not address the specific risks associated with its transmission across networks.