Organizational Data Flashcards
(33 cards)
details relating to buying and selling, production activities and basic organizational operations such as any information used to make employment decisions.
Transactional data
patents, trademarks and new product plans, which allows an organization to gain economic advantage over its competitors. This information is often considered a trade secret and losing it could prove
Intellectual property
income statements, balance sheets and cash flow statements, which provide insight into the health of a company.
Financial data
a large network of physical objects, such as sensors, software and other equipment. All of these ‘things’ are connected to the Internet, with the ability to collect and share data. And given that storage options are expanding through the cloud and virtualization, it’s no surprise that the emergence of IoT has led to an exponential growth in data, creating a new area of interest in technology and business called ‘Big Data.’
IoT
a model framework created in 1991 to help organizations establish and evaluate information security initiatives by considering all of the related factors that impact them. This security model has three dimensions
The McCumber Cube
The McCumber Cube security model has three dimensions:
- The foundational principles for protecting information systems.
- The protection of information in each of its possible states.
- The security measures used to protect data.
a set of rules that prevents sensitive information from being disclosed to unauthorized people, resources and processes. Methods to ensure this include data encryption, identity proofing and two factor authentication.
Confidentiality
ensures that system information or processes are protected from intentional or accidental modification. One way to ensure integrity is to use a hash function or checksum.
Integrity
authorized users are able to access systems and data when and where needed and those that do not meet established conditions, are not. This can be achieved by maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups.
Availability
data that is being used to perform an operation such as updating a database record (data in process).
Processing
data stored in memory or on a permanent storage device such as a hard drive, solid-state drive or USB drive (data at rest).
Storage
data traveling between information systems (data in transit).
Transmission
the measures put in place by an organization to ensure that users are knowledgeable about potential security threats and the actions they can take to protect information systems.
Awareness, training and education
the software- and hardware-based solutions designed to protect information systems such as firewalls, which continuously monitor your network in search of possible malicious incidents.
Technology
the administrative controls that provide a foundation for how an organization implements information assurance, such as incident response plans and best practice guidelines.
Policy and procedure
a group of linked servers providing data storage, databases, networking, and software through the Internet
cloud cluster
an incident that results in unauthorized access to data, applications, services or devices, exposing private information that attackers can use for financial gain or other advantages.
security breach
individuals or groups who attempt to exploit vulnerability for personal or financial gain
Attackers
3 categories of attackers
- White hat
- Gray hat
- Black hat
amateur or inexperienced hackers who use existing tools or instructions found on the Internet to launch attacks
script kiddies
This group of attackers break into computer systems or networks to gain access
hackers
break into networks or computer systems to identify any weaknesses so that the security of a system or network can be improved. These break-ins are done with prior permission and any results are reported back to the owner.
White hat attackers
set out to find vulnerabilities in a system but they will only report their findings to the owners of a system if doing so coincides with their agenda. Or they might even publish details about the vulnerability on the internet so that other attackers can exploit it.
Gray hat attackers
take advantage of any vulnerability for illegal personal, financial or political gain.
Black hat attackers