Identification, Authentication, Authorization, and Accountability (IAAA) are four key principles in information security used to control access to systems, applications, and data while ensuring proper monitoring and tracking of activities.
Data Owner
A Data Owner is a person or entity accountable for the overall management and safeguarding of a specific data set within an organization
Data Custodian
A Data Custodian is responsible for the technical management, storage, and protection of data within an organization.
Biba Model
The Biba Model is a formal security model focused on maintaining data integrity within a system by preventing unauthorized users from modifying critical information.
Bell LaPadula Model
The Bell-LaPadula Model is a formal security model designed to ensure the confidentiality of information by enforcing access controls based on data classification levels and user security clearances and preventing data leakage, but does not address issues like data integrity or availability.
ISC2 – The International Information System Security Certification Consortium
The International Information System Security Certification Consortium (ISC2) is a global nonprofit organization that specializes in providing cybersecurity certifications, training, and resources
CISSP – Certified Information Systems Security Professional
Certified Information Systems Security Professional (CISSP) is an international certification awarded to information security professionals by ISC2, a global organization specializing in training and certification in the field of information security