Definitions Flashcards
Payment Card Industry Data Security Standard (PCI-DSS)
Applies to companies that process credit card payments
HIPPA
applies to healthcare and patient records
Federal Information Security Management Act (FISMA)
Security standards for many federal agencies in the US
What does the CIA Triad consist of?
Confidentiality, Integrity, Availability
What is Confidentiality?
Ability to protect our data from those who are not authorized to view it
What is Integrity?
ability to prevent changing data in an unauthorized manner
What is Availability?
ability to acecss data when we need it
How does the CIA triad relate to security?
Allows us to discuss security measures in more detail
What are the three addtional principals in the Parkerian Hexad?
Control, Authenticity, and Utility
What is Control?
the physical possession of the media that data is stored on
What is Authenticity
Whether the data is attributed to the right owner or creator
What is Utility?
How useful the data is to you
What are the four categories of attacks?
Interception, interruption, modification, and fabrication
Which attacks affect the confidentiality of the CIA triad?
Interception
Which attacks affect the integrity of the CIA triad?
Interruption, modification, fabrication
Which attacks affect the availability of the CIA triad?
Interruption, modification, fabrication
What is an interception attack?
allows unauthorized users to access data, applications or environments
Are interception attacks primarily against confidentiality, integrity, or availability?
Primarily against confidentiality
What is an example of an interception attack?
eavesdropping on a call or reading someone else’s emails
What is an interruption attack?
makes your assets unusuable or unavailable to you on a temporary or permanent basis
Are interruption attacks primarily against confidentiality, integrity, or availability
Primarily affect availability, but can affect integrity as well
What is an example of a interruption attack?
a DoS attack on a mail server
What is a Modification Attack?
it involves tampering with assets
Are modification attacks primarily against confidentiality, integrity, or availability?
primarily on integrity, but could also affect availability.
What is an example of a modification attack?
unauthorized access to a file and then altering the data
What is a Fabrication Attack?
generating data, processes, communications, etc. in a system
Are fabrication attacks primarily against confidentiality, integrity, or availability?
primarily affect integrity, but could affect availability as well
What is data at rest?
data not in the process of being moved
What is an example of data at rest?
hard drive or flash drive
What is data at rest protected with?
encryption
What is data in motion?
data that is moving from one place to another
whats an example of data in motion?
sensitive data moving between your browser and the bank