0 - Striping - If one drive fails, everything is lost, 1 - Mirroring - Data is duplicated on one drive, if one fails there is still integrity and availability, 5 - Striping w/ Parity - Spread across multiple drives. If fails, can be reconstructed via parity, Authentication - Prove you are who you say you are, Authorization - Based on who you are, what can you access, Accounting - Resources Used: Data sent/ login time, Data In Use - Actively Processing in RAM / memory. Usually decrypted, Data in Transit - Data moving over the network, Data at Rest - Data on storage drive, MFA Factor - you know / you have / you are , MFA Attribute - Where you Are / You can Do / You Exhibit / Someone you Know, Purging - Remove it from an existing data store, Wipe - Unrecoverable removal of storage drive data. Can reuse drive after, ECC & Diffie-Hellman - Asymmetric encryption, PFS - use a different encryption key for each session, Iaas - provides the user with the hardware needed to get up and running, and the end user is responsible for the operating system, the application, and any ongoing maintenance tasks., PaaS - provides the building blocks of features and requires the end user to customize their own application from the available modules, SaaS - no local application installation, no ongoing maintenance tasks and no local infrastructure requirements, GLBA - banking, lenders, insurance - limits info they can share with each other, FISMA - formal gov't infosec. , HIPAA - healthcare, COPPA - children online, ECPA - 3rd parties prohibits from intercepting communications, CIS - non profit/ best cybersec practices / threats, NIST CSF - best cybersec practices for private industry, NIST RMF - best cybersec practices for Gov't agencies,

排行榜

視覺風格

選項

切換範本

恢復自動保存: ?