Introduction Flashcards
Define information security
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction
PCI Dss
Payment Card Industry Data Security Standard
FISMA
Federal Information Security Management Act – defines security standards for many agencies in the US
CIA triad
Confidentiality, Integrity, Availability
Confidentiality
CIA leg
ability to protect data from those who are not authorized to view it
Integrity
CIA leg
prevent people from changing your data in an unauthorized or undesirable manner
Availability
CIA leg
ability to access our data when we need it
Parkerian hexad
Donn Parker
CIA- confidentiality, integrity, availability
Authenticity
Utility
Possession
Authenticity
Parkerian hexad leg
allows you to say whether you’ve attributed data in question to proper creator
Possession
Parkerian hexad leg
AKA control
physical disposition of the media on which the data is stored
Utility
Parkerian hexad
how useful the data is to you
Not binary
Confidentiality attack(s)
Interception
Integrity attacks
Interruption
Modification
Fabrication
Availability attacks
Interruption
Modification
Fabrication
Interception
Attack which allows unauthorized users to access your data, applications, or environment
Affects confidentiality
Interruption
Attack which makes your assets unusable or unavailable to you on a temporary or permanent basis
Affects availability and sometimes integrity
Modification
Attack that involves tampering with an asset
Primarily affects integrity but could also be availability