block 8 information protection Flashcards
three components of the CIA TRIAD
- Confidentiality
- Integrity
- Availability
- focuses on data protection from IT Security standpoint (ITsec)
Confidentiality
- ensuring information is
accessible only to those authorized to have access
what is data in use?
-data actively changing.
- application layer of the OSI model.
what is Data-in-motion?
- AKA data-in-transit
- data traversing a network, the internet, etc.
- data in flight = wireless
what is data at rest?
data must not currently be in
use or moving point-to-point.
(ex. files, folders, drives, etc)
what is integrity?
(AKA data authenticity) data not altered in an unauthorized manner from point of origin to delivery
what is hashing?
- mathematical formula to data
- binary form
- taking a virtual snapshot of the data.
what is availability?
- assures that systems work when needed, resources are accessible at all times, and authorized users are not denied services
what does the AAA model focus on?
-maintains CIA triad via access control
- focuses on controlling access to info + data
what is identification?
system to prove individual identity
- Ex. usernames, passwords, CACs, digital tokens, key fobs, and biometrics
what is authentication?
- verifies identification factors
(Ex. CAC card pin)
cac card is identification
pin = authentication
what is authorization?
system applies permissions to a user’s account after logging in to said system
what is accounting?
deals with logging activity so that different departments can be held responsible for their usage of the different services, user and device activity can be tracked and create a chain of custody-type of management workflow, and ensure non-repudiation occurs properly.
- Accounting is done
with various logging events such as system logs, security logs, and application logs.
what is non-repudiation?
recipient proof of actions (receipts), so neither can later deny having processed the information.
what are the 2 acts that grant exceptions to entities?
- USA patriot ACT 2001
- reduce restriction laws to detect and suppress terrorism.
- Electronic Communication Privacy Act (ECPA) of 1986
reduce criminal penalties when unauthorized access to the electronic communication is not for a
tortious or illegal purpose or private commercial gain