Review of the major Privacy concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.
This MindMap review covers:
0:00 Introduction
0:30 Definition of Privacy
1:04 Privacy Policy
1:53: Personal Data
2:05 Types of Personal Data
2:28 Direct Identifiers
2:48 Indirect Identifiers
3:06 Online Identifiers
3:16 Information Lifecycle/Data Lifecycle
3:42 Creation/Update of Data
3:53 Storage of Data
4:05 Usage of Data
4:21 Sharing of Data
4:37 Archiving Data
4:55 Destruction of Data
5:12 Classification of Data
5:50 OECD Guidelines
6:28 Collection Limitation Principle
6:44 Data Quality Principle
6:58 Purpose Specification Principle
7:11 Use Limitation Principle
7:23 Security Safeguards Principle
7:38 Openness Principle
7:54 Individual Participation Principle
8:10 Accountability Principle
8:25 Privacy Laws and Regulations
8:34 General Data Protection Regulation (GDPR)
8:58 Supervisory Authority (SA)
9:52 Outro
Other MindMaps:
Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI
Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I
Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU
Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M
Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY
Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E
Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw
CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]