Loading...

COMPUTER SECURITY  

>

LEARNING OUTCOME 2

DATA CLASSIFICATION

Data classification is the process of categorizing data based on its sensitivity, criticality, and value to the organization. The classification process typically involves assigning a label or classification to each piece of data, which determines the level of security and control that should be applied to it. This helps organizations to protect their data from unauthorized access, use, or disclosure.

There are many different ways to classify data, but a common approach is to use four categories:

Organizations can also create their own data classification schemes based on their specific needs. For example, a healthcare organization might have additional categories for sensitive patient data, such as protected health information (PHI).

Advantages of data classification

Data classification provides a number of benefits, including:

Activities involved in data classification:

DATA CLASSIFICATIONS

Establish specialised data/information protection methods

DETERRENT CONTROLS, DETECTIVE CONTROLS, CORRECTIVE CONTROLS, AND PREVENTIVE CONTROLS

Deterrent controls, detective controls, corrective controls, and preventive controls are four types of internal controls that organizations can use to protect their assets and achieve their business objectives.

By implementing a combination of these four types of controls, organizations can reduce the risk of fraud, errors, and other unauthorized activities.

ACCESS CONTROL METHODS

There are four main types of access control methods: discretionary, mandatory, role-based, and rule-based.

Comparison of the four access control methods

Method Description Benefits Drawbacks
Discretionary access control (DAC) Gives the owner of a resource the ability to control who has access to it and what they can do with it. Flexible and easy to implement. Can lead to security vulnerabilities if users are not careful.
Mandatory access control (MAC) Uses labels to classify data and users, and enforces a set of rules about who can access what data. Provides high levels of security. Can be complex and difficult to manage.
Role-based access control (RBAC) Assigns users to roles, and then grants permissions to the roles instead of to individual users. Easier to manage access control in large organizations. Can be complex to set up and maintain.
Rule-based access control (RBAC) Uses rules to determine whether or not to grant access to a resource. Can be very flexible and granular. Can be complex to set up and maintain.

Evaluation of the impact of each of the selected methods

Discretionary access control (DAC): DAC is the most common type of access control, but it can also be the most insecure. This is because DAC relies on users to make good decisions about who to grant access to their resources and what permissions to grant. If a user is careless or malicious, they could grant access to unauthorized users or grant too many permissions.

Impact: DAC can have a significant impact on the security of an organization. If DAC is not implemented correctly, it can lead to data breaches, malware infections, and other security incidents. However, DAC is also flexible and easy to implement, making it a good option for small organizations with low-security requirements.

Mandatory access control (MAC): MAC is a more secure type of access control than DAC, but it can also be more complex and difficult to manage. MAC uses labels to classify data and users, and it enforces a set of rules about who can access what data. This makes it difficult for unauthorized users to access sensitive data, even if they are able to compromise a user's account.

Impact: MAC can have a significant positive impact on the security of an organization. By restricting access to sensitive data, MAC can help to prevent data breaches, malware infections, and other security incidents. However, MAC can also be complex and difficult to manage, making it a better choice for large organizations with high-security requirements.

Role-based access control (RBAC): RBAC is a good middle ground between DAC and MAC. RBAC assigns users to roles, and then grants permissions to the roles instead of to individual users. This makes it easier to manage access control, especially in large organizations with many users.

Impact: RBAC can have a positive impact on the security of an organization by making it easier to manage access control. However, RBAC can also be complex to set up and maintain, and it may not be appropriate for all organizations.

Rule-based access control (RBAC): RBAC is the most flexible and granular type of access control, but it can also be the most complex to set up and maintain. RBAC uses rules to determine whether or not to grant access to a resource. The rules can be based on a variety of factors, such as the user's identity, the time of day, the location of the user, and the type of device the user is using.

Impact: RBAC can have a significant positive impact on the security of an organization by providing a high level of control over access to resources. However, RBAC can also be complex and difficult to manage, and it may not be appropriate for all organizations.

APPROACHES TO SECURITY

PHYSICAL SECURITY is the protection of physical assets and resources from unauthorized access, use, disclosure, disruption, modification, or destruction. Physical security measures can include:

LOGICAL SECURITY is the protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Logical security measures can include:

Relationship between physical and logical security: Physical and logical security are complementary and should be implemented together to provide a comprehensive security solution. For example, physical security measures can help to protect logical security measures, such as servers and network equipment. Similarly, logical security measures can help to protect physical security measures, such as access control systems and security cameras.

INTERPRET THE RESULTS OF A NETWORK CONNECTIVITY TEST

The results of network connectivity tests can be interpreted to assess the overall health and performance of a network. Some common metrics that are measured during network connectivity tests include:

In addition to these quantitative metrics, network connectivity tests can also provide qualitative information about the network, such as:

By interpreting the results of network connectivity tests, organizations can identify and resolve network problems, improve network performance, and reduce the risk of network outages.

Here is an example of how to interpret the results of a network connectivity test:

ping test

This output indicates that the test was able to successfully ping the destination address, 8.8.8.8, with an average ping response time of 12 milliseconds. This indicates that the network connection to the destination address is healthy and responsive.

Here is another example:

ping test

Network Connectivity Test Results

This output indicates that the test was unable to ping the destination address, 192.168.1.1. This could be due to a number of factors, such as a network outage, a firewall blocking traffic, or a problem with the destination device itself.

By interpreting the results of network connectivity tests, organizations can identify and resolve network problems to ensure that their networks are operating reliably and efficiently.

Importance of Backup

Backup Devices

There are a variety of backup devices available, including:

Establishing a Backup Plan

To establish a backup plan, you should consider the following factors:

Here is an example of a simple backup plan:

This backup plan will help to protect the data from loss and ensure that it can be restored quickly if necessary.

Data Backup

Data backup is the process of copying data to a separate location so that it can be recovered in the event of data loss. There are three main types of data backup: local backup, online backup, and offsite backup.

Power Backup

Power backup is important for protecting data and ensuring that systems remain operational during a power outage. There are two main types of power backup: UPS (uninterruptible power supply) and generator.

Strategies for Backup

The best backup strategy for an organization will depend on its specific needs and requirements. However, there are some general strategies that can be followed:

End of Outcome Quiz

1 of 20

    Quiz Score

    Percentage: 0%

    Answered Questions: 0

    Correct Answers: 0

    Faults: