Data Security Challenges Flashcards
[Myth or Fact?]
Hackers cause most security breaches.
myth
[Myth or Fact?]
Encryption is only one approach to securing data. Security also requires access control, data integrity, system availability and auditing.
Fact
[Myth or Fact?]
Firewalls make your data secure.
Myth
Your computers must be physically inaccessible to unauthorized
users. This means that you must keep them in a secure physical
Environment.
Physical
The people responsible for system administration and data security at your site must be reliable. You may need to perform background checks on DBAs before making hiring decisions.
Personnel
The procedures used in the operation of your system must assure reliable data.
One person might be responsible for
database backups. His/ her role is to be sure the database is up
and running.
Procedural
Storage, access, manipulation, and transmission of data must be
safeguarded by technology that enforces your particular
information control policies
Technical
Basic Security Standards (ung laging tatlo)
- Confidentiality
- Integrity
- Availability
A secure system ensures the
confidentiality of data.
This means that it
allows individuals to see only the data which they are supposed to see.
Confidentiality
Aspects of Confidentiality (4)
- Privacy of Communication
2, Secure Storage of Sensitive Data - Authenticated Users
- Granular Access Control
is the process by which a user’s identity is checked.
Authentication
is the process by which the user’s privileges are ascertained.
Authorization
is the process by which the user’s access to physical data in the application is limited, based on his privileges.
Access control
A secure system ensures that the data it contains is valid.
Integrity
means that data is protected from deletion and corruption, both while it resides within the database, and while it is being transmitted over the network.
Data integrity