„Információs rendszerek üzemeltetése - Nagykérdések” változatai közötti eltérés
| 233. sor: | 233. sor: | ||
# Titkosítás: * '''!!!HIÁNYZIK!!!''' | # Titkosítás: * '''!!!HIÁNYZIK!!!''' | ||
Inkább ezek: | |||
* Confidentiality | |||
Confidentiality refers to preventing the disclosure of information to unauthorized individuals or systems. For example, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system attempts to enforce confidentiality by encrypting the card number during transmission, by limiting the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an unauthorized party obtains the card number in any way, a breach of confidentiality has occurred. Confidentiality is necessary for maintaining the privacy of the people whose personal information a system holds. | |||
* Integrity | |||
In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire life-cycle. This means that data cannot be modified in an unauthorized or undetected manner. This is not the same thing as referential integrity in databases, although it can be viewed as a special case of Consistency as understood in the classic ACID model of transaction processing. Integrity is violated when a message is actively modified in transit. Information security systems typically provide message integrity in addition to data confidentiality. | |||
* Availability | |||
For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. High availability systems aim to remain available at all times, preventing service disruptions due to power outages, hardware failures, and system upgrades. Ensuring availability also involves preventing denial-of-service attacks. | |||
=== 25. Milyen funkciójú DNS szerverek ismertek egy Intranet infrastruktúrában, és mi a szerepük? === | === 25. Milyen funkciójú DNS szerverek ismertek egy Intranet infrastruktúrában, és mi a szerepük? === | ||