Data Security Flashcards

1
Q

What are the 5 pillars of information security?

Describe them for me.

Remember: AIPIN

A

Authentication- Verifying users’ features.

Identification- Verifying users to see which privileges they are granted.

Privacy- Protecting Information from unauthorised access.

Integrity- Protecting data from unauthorised changes.

Nonrepudiation- Prevents parties from denying actions they have taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

There are four levels of information security represented by a traffic light system.

Name all four and describe each.

A

Red- Extremely confidential. Few members of business have access. System is critical to running of the business.
Example: Network and firewall/security data.

Amber- Not critical information but still provides access to the “red” level information.
Example: Employee PC’s with access to network and server.

Green: For all staff and associated external companies (like shareholders)
Example: a prototype of a new system.

White: Isolated from red/amber/green systems by a firewall, no confidential information, public access.
Example: Public web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly