Data Security Flashcards
What are the 5 pillars of information security?
Describe them for me.
Remember: AIPIN
Authentication- Verifying users’ features.
Identification- Verifying users to see which privileges they are granted.
Privacy- Protecting Information from unauthorised access.
Integrity- Protecting data from unauthorised changes.
Nonrepudiation- Prevents parties from denying actions they have taken.
There are four levels of information security represented by a traffic light system.
Name all four and describe each.
Red- Extremely confidential. Few members of business have access. System is critical to running of the business.
Example: Network and firewall/security data.
Amber- Not critical information but still provides access to the “red” level information.
Example: Employee PC’s with access to network and server.
Green: For all staff and associated external companies (like shareholders)
Example: a prototype of a new system.
White: Isolated from red/amber/green systems by a firewall, no confidential information, public access.
Example: Public web server.