Transcription of Sunflower CISSP
{{id}} {{{paragraph}}}
CISSP Summary Version Maarten de Frankrijker, CISSP . Revised by Christian Reina, CISSP . Revised by Steve Warnock __..-/ \-. ( \__/ ). /` ;;\.-`\. \ _.\;;/._ /. ( / \ ). '-\__/-'.-, , \\ (-. ). |\_ ||/.-`. \'.\_ |;`. '--,\|| , `;| _/|. // _/.'/. //_/,--'. ||'-`. Domain 1: Security and Risk Management Concepts (10). CIA. DAD - NEGATIVE -(disclosure alteration and destruction). Confidentiality - prevent unauthorized disclosure, need to know, and least privilege. Assurance that information is not disclosed to unauthorized programs, users, processes, encryption, logical and physical access control, Integrity - no unauthorized modifications, consistent data, protecting data or a resource from being altered in an unauthorized fashion Availability - reliable and timely, accessible, fault tolerance and recovery procedures, WHEN. NEEDED. IAAA - requirements for accountability Identification - user claims identity, used for user access control Authentication - testing of evidence of users identity Accountability - determine actions to an individual person Authorization - rights and permissions granted Privacy - level of confidentiality and privacy protection Risk (12).
similar framework. Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) - Congress amended HIPAA by passing this Act. This law updated many of HIPAA’s privacy and security requirements. One of the changes is a change in the way the law treats business associates
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}