preview

Comptia a+

Better Essays

1. Actions that can damage an asset
A threat: Flood, earthquake, severe storms. 2. Laws to protect private financial information * Federal information security management act(FISMA) * Sarbanes Oxley act (SOX) * Gramm leach Bliley act(GLBA) * Health insurance portability and accountability act(HIPAA) * Children’s internet protection (CIPA) * Family educational rights and privacy act (FERPA) 3. Parts of layered security that supports confidentiality * Defining organization wide policies, standard, procedures, and guidelines to protect confidential data. * Adopting a data classification standard that defines how to treat data throughout AT. * Limiting access to systems and application that house …show more content…

14. Examples of access control formal model * Discretionary access control(DAC): owner of the resource decides who gets in , and change permission as needed. * Mandatory access control(MAC): permission to enter a system is kept by the owner. It cannot be given to someone else. * Non discretionary access control: are closely monitored by security administrator, not sys admin * Rule based access control: rules list, maintained by the data owner. Determines which user have access to object. 15. Access control models * Bell-la padula: focuses on the confidentiality of data and the control of access to classified information. Parts of system are divide into sub and object, current condition of sys is described as its state * Biba integrity: 1977, Kenneth j biba, first model address integrity in computer systems based on integrity level , fix weakness ness of bell la * Clark and Wilson: 1987 david clark and Wilson: focus on what happened when user allow into system try to do thing they are not permit to. * Brewer and nash 1989 base on mathematical theory apply dynamically changing access permission. 16. Rules that must be complied with 17. Parts of ordinary IT security policy framework 18. How to determine appropriate access to classified data 19. Management baseline setting 20. Primary steps in SDLC 21. Processes

Get Access