Cloud and Wireless Security Flashcards
What is it called when someone in an organization looks at the data they have in their organization, and start to classify it based on its privacy and confidentiality level?
Data classification
Which data classification includes data about people that must be kept private, organizations must use proper security controls to be in compliance?
Private Data
What data classification involves information or data owned by the organization including intellectual property, customer lists, pricing information, and patents?
Confidential
What data classification involves information or data shared internally by an organization, although confidential information and/or data may not be included, communications are not intended to leave the organization?
Internal use only
What data classification involves information or data shared with the public, such as website content, white papers, and the like?
Public domain data
What type of access control has each individual owner of a resource manage their own access control policy?
Discretionary access control (DAC)
What type of access control groups users into common categories and applies permissions to those categories and refer to them as roles?
Role-based Access Control (RBAC)
What type of access control have permissions based on attributes such as location, time, or device?
Attribute-based access control (ABAC)
What type of access control has access allowed or denied based on fixed rules?
Rule-based Access Control (RuBAC)
What type of access control is based on the context or state of the transaction and evaluates the situation or environment in which the access request is being made?
Context-based Access Control (CBAC)
What do you call stored, inactive data?
Data at rest
What do you call data being transmitted over a network?
Data in Transit
What are the four aspects of access control?
Identification, Authentication, Authorization, and Accountability
Which aspect of access control are assertions made by users about who they are?
Identification
Which aspect of access control is proving identification?
Authentication