Technical Data and Privacy Controls Flashcards
An access control model can be applied to any type of data or software resource
o File system security
o Network security
o Database security
Access Controls
incorrect permissions allocated to a resource can cause a data breach
o Windows
o Linux
File System Permissions
A command-line tool for showing and modifying file permissions
▪ N - No access
▪ F – Full access
▪ R – Read-only
▪ RX – Read and execute
▪ M – Modify
▪ W – Write
▪ D – Delete
icacls
The ability to access and view the contents of a file or list the contents
of a directory
Read (r)
The ability to save changes to a file, or create, rename, and delete files
in a directory
(deleting requires execute)
Write (w)
The ability to run a script, program, or other software file, or the ability
to access a directory, execute a file from that directory, or perform a
task on that directory
Execute (x)
These permissions determine what the file’s owner can do with the file
Owner Permissions
These permissions determine what members of the file’s group who are
not its owner can do with the file
Group Permissions
These permissions determine what users who are not the file’s owner
or members of its group can do with the file
World or Other Permissions
A Linux command that is used to modify permissions for files
chmod
A Linux command that is used to modify the owner of a file
chown
Inactive data that is stored physically in any digital form
Data at Rest
Data that is actively being transmitted over a network
Data in Transit (or Data in Motion)
Active data which is stored in a non-persistent digital state typically in
computer random-access memory (RAM), CPU caches, or CPU registers
Data in Use
A software solution that detects and prevents sensitive information from being
stored on unauthorized systems or transmitted over unauthorized networks
▪ Policy server
▪ Endpoint agents
▪ Network agents
Data Loss Prevention