Information Security Risk Management Flashcards
(85 cards)
a combination of public and private clouds
Hybrid cloud
a cloud service reserved for only one customer or company
Private cloud
IaaS
(Infrastructure-as-a-Service)
Paas
(Platform-as-a-Service)
SaaS
(Software-as-a-Service)
a cloud-based system managed by a cloud provider and shared among multiple customers, like
Public cloud
It’s simply means that the application is running in a shared environment. Businesses must make sure that there is adequate isolation between different processes in shared environments.
Cloud Security
The sender must not be able to deny sending the data or communication.
(non-repudiation)
The recipient should be able to ______ the sender,
authenticate
Its _______ must be maintained in transit (meaning the data isn’t altered)
integrity
Information must be kept __________
confidential
are commonly used in cryptography to validate the authenticity of data.
Digital Signatures
Encrypting data in transit and data at rest helps ensure data confidentiality and integrity.
Encryption
Validates that a user has permission to access the application by comparing the user’s identity with a list of authorized users
Authorization
Software developers build procedures into an application to ensure that only authorized users gain access to it. This procedure ensure that a user is who they say they are.
Authentication
Involves using a mathematical algorithm called a hash function to convert input data into a fixed-size string of characters, known as a hash value or hash code.
Hash Function
- One key is used to only encrypt the data (the public key) and another key is used to decrypt (the private key).
Asymmetric Cryptography
The same key used to encrypt the data is used to decrypt the data. This makes sharing the key difficult, as anyone who intercepts the message and sees the key can then decrypt your data
Symmetric Cryptography
Resource owners can manage access using discretionary access control (DAC).
Discretionary Access Control (DAC):
Authorization based on preestablished rules is known as rule-based authorization.
Rule-Based Authorization:
ABAC bases choices on the user, resource, and context attributes. It makes use of rules that specify circumstances affecting these characteristics.
ABAC (Attribute-Based Authorization):
Role-Based Authorization (RBAC): RBAC grants access permissions based on the roles allocated to users.
Authorization
This authorization technique verifies the user using the authorization server’s authentication. an interoperable authentication protocol based on the OAuth 2.0 framework of specifications
OpenID Authorization
This authorization technique enables an API to authenticate and provide access (access token) to the user for the requested resource or action.
Oauth