From 69df856ca59616ea049cf3e27faa7647990c1a27 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Sat, 23 Jul 2022 16:01:13 +1200 Subject: [PATCH] vault backup: 2022-07-23 16:01:13 --- content/notes/01-big-picture.md | 27 +++++++++++++++++++++-- content/notes/comp-210.md | 2 +- content/notes/information-security.md | 31 +++++++++++++++++++++++++++ content/notes/security-big-picture.md | 16 -------------- 4 files changed, 57 insertions(+), 19 deletions(-) create mode 100644 content/notes/information-security.md delete mode 100644 content/notes/security-big-picture.md diff --git a/content/notes/01-big-picture.md b/content/notes/01-big-picture.md index 0108cf1c5..8632457ed 100644 --- a/content/notes/01-big-picture.md +++ b/content/notes/01-big-picture.md @@ -4,11 +4,34 @@ aliases: tags: - comp210 - lecture -sr-due: 2022-07-22 -sr-interval: 3 +sr-due: 2022-08-01 +sr-interval: 9 sr-ease: 250 --- +- [information-security](notes/information-security.md) +- [mccumber-cube](notes/mccumber-cube.md) +- [access-security-tradeoff](notes/access-security-tradeoff.md) +- [cia-triad](notes/cia-triad.md) + + + + + + + + + + + + + + + + + + + # In the news - [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html) diff --git a/content/notes/comp-210.md b/content/notes/comp-210.md index 2e12116d1..f20ca0abd 100644 --- a/content/notes/comp-210.md +++ b/content/notes/comp-210.md @@ -14,7 +14,7 @@ No final exam - [assignment 2](notes/ass02-repaired-system) # Notes - +- [information-security](notes/information-security.md) - [mccumber-cube](notes/mccumber-cube.md) - [access-security-tradeoff](notes/access-security-tradeoff.md) - [cia-triad](notes/cia-triad.md) diff --git a/content/notes/information-security.md b/content/notes/information-security.md new file mode 100644 index 000000000..586f2ae94 --- /dev/null +++ b/content/notes/information-security.md @@ -0,0 +1,31 @@ +--- +title: "information-security" +aliases: +tags: +- comp210 +--- + +Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure. + +>[!Definition] +> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.” +> (ISO27000 Information Security Management Systems – Overview and Vocabulary) + +There is a continuous need for IS as the environement around it is rapidly changing. + +Information systems have 6 main components +- data +- people +- hardware +- software +- network +- procedures + +IS can be split into three main components, called the [cia-triad](notes/cia-triad.md). The components are: +- Confidentiality +- Availability +- Integrity + +People often use the [mccumber-cube](notes/mccumber-cube.md) to think about the security of their system and identify potential vulnerabilities. + +It is impossible to create a "perfectly secure system". There exists a [access-security-tradeoff](notes/access-security-tradeoff.md) \ No newline at end of file diff --git a/content/notes/security-big-picture.md b/content/notes/security-big-picture.md deleted file mode 100644 index 0f03270cf..000000000 --- a/content/notes/security-big-picture.md +++ /dev/null @@ -1,16 +0,0 @@ ---- -title: "security-big-picture" -aliases: -tags: -- comp210 ---- - -Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure. - ->[!Definition] -> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.” -> (ISO27000 Information Security Management Systems – Overview and Vocabulary) - -There is a continuous need for IS as the environement around it is rapidly changing. - -In