Chapter 2 Flashcards
(32 cards)
What is the information security CIA triad?
C Confidentiality
I Integrity
A Availability
Authentication
is the process of verifying identity.
Availability
is the principle that Information Systems, and supporting infrastructure are operating and accessible when needed.
OECD privacy principles -Collection Limitation
- collection should be obtained by lawful and fair means and where appropriate with the knowledge and consent of the data subject.
OECD privacy principles - Data Quality
Personal data should be relevant to the purpose collected and should be accurate, complete, and kept up to date.
OECD privacy principles - Use Limitation
Use Limitation - personal data should not be disclosed or otherwise used for purposes other then specified except with the consent of the data subject or by the authority of law.
OECD privacy principles - purpose Specification
purpose Specification - purpose for which personal data is collected should be specified not later than at the time of data collection.
Confidentiality
is the assurance that information is not disclosed to unauthorized persons, processes, or devices. Confidentiality covers data in storage, during processing, and in transit.
Privacy
Is the right of an individual to control the use of their personal information.
Data Privacy controls relate to actions regarding collection, usage, notification, accuracy, and sharing.
Confidentiality
foces on protectng the data in our possession from unauthorized access or disclosure.
Authorization
is the process of approving access.
Non-repudiation
is the process of assuring the validity and origin of data.
Accounting
is the process of tracing actions to the source.
Data Plane
is used for communication (moving data) between software components.
Control Plane
is used by infrastructure components to maintain and configure assets, access control and communication security. In a ZT environment, requests for access are made through the control plan.
Policy Administrator
Control Plane - Part of the Policy Decision Point. generates any session-specific authentication and authentication token, or credential used to access an enterprise resource.
Policy Decision Point
Control Plane - functions as a gatekeeper. The PDP has two logical components: Policy Engine & Policy Administrator
Policy Enforcement Point
responsible for enabling, monitoring and eventually terminating connections between a subject and an enterprise resource.
Policy Engine
Control Plane - Part of the Policy Decision Point. responsible for the ultimate decision to grant access to a resource for a given subject.
CPTED - Crime prevention through environmental design
is that proper design and effective use of the physical environment can lead to a reduction in the incidence and fear of crime and increase safety.
Sag
Moment of low voltage
Temperature
between 64 and 80 degrees
Fire use clean suppression like
FM-200, Novec 1230 or inert gases
Power Protection Controls
Voltage regulator, surge protector, power line conditioners, battery backup/UPS