Strona 1

Information Security

Pytanie 1
System is trusthworthy if:
Pytanie 2
CIA triad it is:
Pytanie 3
CIA triad -roles
confidentiality
preventing unauthorized viewing of data
Availability
timely, reliable access to data and information services for authorized users
intergrity
prevent unauthorized modification of data
Pytanie 4
five pillars of informaty assurance:
Pytanie 5
Attack phases
1
selecting target
2
removing traces
3
attacking IT system
4
propagating attack
5
modyfing IT system
6
scanning
Pytanie 6
information system security 3
3 management constraints,
information system 1
1 IT System
information system 3
3 orgaznizations
information system 2
2 other infrastructure
information system security 4
4 physical structure and device security,
information system security 2
2operational and accountability procedures,
information system security 1
1 IT System Security
information system security 5
5 personnel and communication controls.
information system 4
4 person
Pytanie 7
acces controly
RBAC
Roles correspond to various organization functions
DAC
restricts access to objects based on the identityof subjects or groups to which they belong
ABAC
access is granted based on attributes of the user
MAC
globally constrains the ability of a subjectto perform an operation on an object
Pytanie 8
Access control elements

Powiązane tematy