mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-23 16:01:13
This commit is contained in:
parent
f9e905d752
commit
69df856ca5
@ -4,11 +4,34 @@ aliases:
|
|||||||
tags:
|
tags:
|
||||||
- comp210
|
- comp210
|
||||||
- lecture
|
- lecture
|
||||||
sr-due: 2022-07-22
|
sr-due: 2022-08-01
|
||||||
sr-interval: 3
|
sr-interval: 9
|
||||||
sr-ease: 250
|
sr-ease: 250
|
||||||
---
|
---
|
||||||
|
|
||||||
|
- [information-security](notes/information-security.md)
|
||||||
|
- [mccumber-cube](notes/mccumber-cube.md)
|
||||||
|
- [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||||
|
- [cia-triad](notes/cia-triad.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
# In the news
|
# In the news
|
||||||
|
|
||||||
- [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html)
|
- [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html)
|
||||||
|
|||||||
@ -14,7 +14,7 @@ No final exam
|
|||||||
- [assignment 2](notes/ass02-repaired-system)
|
- [assignment 2](notes/ass02-repaired-system)
|
||||||
|
|
||||||
# Notes
|
# Notes
|
||||||
|
- [information-security](notes/information-security.md)
|
||||||
- [mccumber-cube](notes/mccumber-cube.md)
|
- [mccumber-cube](notes/mccumber-cube.md)
|
||||||
- [access-security-tradeoff](notes/access-security-tradeoff.md)
|
- [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||||
- [cia-triad](notes/cia-triad.md)
|
- [cia-triad](notes/cia-triad.md)
|
||||||
|
|||||||
31
content/notes/information-security.md
Normal file
31
content/notes/information-security.md
Normal file
@ -0,0 +1,31 @@
|
|||||||
|
---
|
||||||
|
title: "information-security"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- comp210
|
||||||
|
---
|
||||||
|
|
||||||
|
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
|
||||||
|
|
||||||
|
>[!Definition]
|
||||||
|
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
||||||
|
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
||||||
|
|
||||||
|
There is a continuous need for IS as the environement around it is rapidly changing.
|
||||||
|
|
||||||
|
Information systems have 6 main components
|
||||||
|
- data
|
||||||
|
- people
|
||||||
|
- hardware
|
||||||
|
- software
|
||||||
|
- network
|
||||||
|
- procedures
|
||||||
|
|
||||||
|
IS can be split into three main components, called the [cia-triad](notes/cia-triad.md). The components are:
|
||||||
|
- Confidentiality
|
||||||
|
- Availability
|
||||||
|
- Integrity
|
||||||
|
|
||||||
|
People often use the [mccumber-cube](notes/mccumber-cube.md) to think about the security of their system and identify potential vulnerabilities.
|
||||||
|
|
||||||
|
It is impossible to create a "perfectly secure system". There exists a [access-security-tradeoff](notes/access-security-tradeoff.md)
|
||||||
@ -1,16 +0,0 @@
|
|||||||
---
|
|
||||||
title: "security-big-picture"
|
|
||||||
aliases:
|
|
||||||
tags:
|
|
||||||
- comp210
|
|
||||||
---
|
|
||||||
|
|
||||||
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
|
|
||||||
|
|
||||||
>[!Definition]
|
|
||||||
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
|
||||||
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
|
||||||
|
|
||||||
There is a continuous need for IS as the environement around it is rapidly changing.
|
|
||||||
|
|
||||||
In
|
|
||||||
Loading…
Reference in New Issue
Block a user