Ch. 6 Flashcards
What is confidentiality?
Restrict access to authorized individuals
What is integrity?
Data has no been altered in an unauthorized manner
What is availability?
Information can be accessed and modified by authorized individuals in an appropriate timeframe
What are the tools for information security?
- Authentication
- Access control
- Encryption
- Passwords
- Backup
- Firewalls
- Virtual private networks (VPN)
- Physical security
- Security policies
What is authentication?
Persons accessing the information is who they say they are.
What is access control?
Once it is authenticated, it only provides access to information necessary to perform their job duties to read, modify, add, and/or delete information and is broken up into:
- Access control list (ACL)
- Role-based access control (RBAC)
What is access control list (ACL)?
Created for each resource (information) and is a list of users that can read, write, delete or add information and it is difficult to maintain all the lists.
What is role-based control (RBAC)?
Rather than individual lists, users are assigned to roles and these roles define what they can access and simplifies administration.
What is encryption?
An algorithm (program) that encodes or scrambles information during transmission or storage. It is decoded/scrambled by only authorized individuals to read it.
Both the coder and reader agree on the encryption method to use. What two encryption methods are there using keys?
- Symmetric key
2. Public key
What is a symmetric key?
Sender and receiver have the key which can be risky
What is a public key?
A public and private key is used where the public key is used to send an encrypted message and a private key that the receiver uses to decode the message
What are passwords?
Single-factor authentication (user ID/password) is the easiest to break
What is a backup?
Important information should be backed up and stored in a separate location.
What is a firewall?
Inspects and stops packets of information that don’t apply to strict set of rules.