mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-23 16:01:13
This commit is contained in:
parent
f9e905d752
commit
69df856ca5
@ -4,11 +4,34 @@ aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
sr-due: 2022-07-22
|
||||
sr-interval: 3
|
||||
sr-due: 2022-08-01
|
||||
sr-interval: 9
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
- [information-security](notes/information-security.md)
|
||||
- [mccumber-cube](notes/mccumber-cube.md)
|
||||
- [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||
- [cia-triad](notes/cia-triad.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# In the news
|
||||
|
||||
- [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html)
|
||||
|
||||
@ -14,7 +14,7 @@ No final exam
|
||||
- [assignment 2](notes/ass02-repaired-system)
|
||||
|
||||
# Notes
|
||||
|
||||
- [information-security](notes/information-security.md)
|
||||
- [mccumber-cube](notes/mccumber-cube.md)
|
||||
- [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||
- [cia-triad](notes/cia-triad.md)
|
||||
|
||||
31
content/notes/information-security.md
Normal file
31
content/notes/information-security.md
Normal file
@ -0,0 +1,31 @@
|
||||
---
|
||||
title: "information-security"
|
||||
aliases:
|
||||
tags:
|
||||
- comp210
|
||||
---
|
||||
|
||||
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
|
||||
|
||||
>[!Definition]
|
||||
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
||||
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
||||
|
||||
There is a continuous need for IS as the environement around it is rapidly changing.
|
||||
|
||||
Information systems have 6 main components
|
||||
- data
|
||||
- people
|
||||
- hardware
|
||||
- software
|
||||
- network
|
||||
- procedures
|
||||
|
||||
IS can be split into three main components, called the [cia-triad](notes/cia-triad.md). The components are:
|
||||
- Confidentiality
|
||||
- Availability
|
||||
- Integrity
|
||||
|
||||
People often use the [mccumber-cube](notes/mccumber-cube.md) to think about the security of their system and identify potential vulnerabilities.
|
||||
|
||||
It is impossible to create a "perfectly secure system". There exists a [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||
@ -1,16 +0,0 @@
|
||||
---
|
||||
title: "security-big-picture"
|
||||
aliases:
|
||||
tags:
|
||||
- comp210
|
||||
---
|
||||
|
||||
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
|
||||
|
||||
>[!Definition]
|
||||
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
||||
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
||||
|
||||
There is a continuous need for IS as the environement around it is rapidly changing.
|
||||
|
||||
In
|
||||
Loading…
Reference in New Issue
Block a user