Security cyber - Confidentiality
• Data cannot be accessed by unauthorized parties
• Need to define what data may be accessed by whom (policy/policy)
• Personal data? Customer data? Health data?
• Attack
• Password cracking, bypassing access restrictions
• Social engineering, cheats to get credential
• Unencrypted data, sniffing, snooping data (shouldering)
• Protection
• Encryption (turning data so it looks like trash), https
• Restrict access, access control lists, segmentation
• Clear Standard Operating Procedures
|•SOURCE•| Articles :BANKING | Image : HEYLAWEDU |
READ MORE
|• NATIONAL •|Vaccination Centers For General Public
|• INTERNATIONAL •|During January 837 Business Places in
|• BANKING •|Inflation Overshadows Poverty Reduction
|• POLITICS •|Palm Oil Still Faces Number Of Problems
|• SCIENCE •|The Story Of Pioneer Of Paper Forest In
• Personal data? Customer data? Health data?
• Attack
• Password cracking, bypassing access restrictions
• Social engineering, cheats to get credential
• Unencrypted data, sniffing, snooping data (shouldering)
• Protection
• Encryption (turning data so it looks like trash), https
• Restrict access, access control lists, segmentation
• Clear Standard Operating Procedures
|•SOURCE•| Articles :BANKING | Image : HEYLAWEDU |
READ MORE
|• NATIONAL •|Vaccination Centers For General Public
|• INTERNATIONAL •|During January 837 Business Places in
|• BANKING •|Inflation Overshadows Poverty Reduction
|• POLITICS •|Palm Oil Still Faces Number Of Problems
|• SCIENCE •|The Story Of Pioneer Of Paper Forest In
0 comments: