Cybersecurity Foundations HSR Vorlesung 1-5 PART 2: https://card2brain.ch/box/20200731_cysec_foundations_teil_2
Wähle die Ordner aus, zu welchen Du "Cybersecurity Foundations" hinzufügen oder entfernen möchtest
What different ways of data removing/erasing are possible
Erasing: only link to the data is removed, actual data remains on the drive
Clearing: Clearing or Overwriting is a process to preparing media for reuse and make sure that deleted data can not be recovered using traditional tools,
Purging: more intense from of clearing used in less secure environments
Degaussing: erasing data with a strong magnetic field from, does not affect CDs, DVDs and SSDs
Destruction: Destroy it in a way that it cannot be repaired.
How does the CIA triad look like?
a triad of
Describe Integrty in the context of the CIA triad
Protecting the reliability and correctness of data
Data integrity implies information is known to be good, and the information can be trusted as being complete, consistent and accurate
System integrity implies that a system will work as it is intended to.
Examples: intrusion detection systems, hash verification
Describe availability in the context of the CIA triad
Authorized subjects are granted unlimited and uninterrupted access to objects.
Examples: Redundancy, maintain reliable backups, prevent data loss or destruction
Describe Confidentiality in the context of the CIA triad
Prevent or minimize unauthorized access to data. Allow authorized users access to the data and prevent it for everyone else.
Examples: encryption, access control
Describe Nonrepudiation & accountability
Nonrepudiation: records all actions, so that who caused the event cannot deny it was done by him/her
Accountability: Being responsible or obligated for actions and results
Examples: Nonrepudiation can be established using digital certificates, session identifiers, transaction logs.
Describe Copyright and how its used
Describe Trademarks and how they are used