vault backup: 2022-07-13 19:37:16

This commit is contained in:
Jet Hughes 2022-07-13 19:37:16 +12:00
parent cbc1ad833e
commit 8e48a5001b
2 changed files with 30 additions and 1 deletions

View File

@ -59,6 +59,32 @@ can all be sources of attacks
- e.g., back: inside knowledge of faults within the business, that can be exploited
# CIA Triad
how security has been appraoched by industry for ages
- Confidentiality
- having information protected from exposure
- blocking unauthorised access
- Availability
- Integ
- authentic state of information
- preventing corruption etc.
- e.g., checksum, hash check etc
- Integrity
- information being available to users without obstables
- DDoS
Other models have been developed
- [slide](https://i.imgur.com/GJfb8Ph.png)
# McCumber Cube
- a way to think about how to protect your information
- [slide](https://i.imgur.com/5Ls2yUp.png)
- a map
- can be used to find "holes"
# Access Security tradeoff
- perfect info security is impossible
- unrestricted access is dangerous
- completely secure would not allow access to anyone
- balance is key

View File

@ -9,6 +9,9 @@ tags:
---
# Assignments
No final exam
- [assignment 1](notes/01-security-audit)
- [assignment 2](notes/02-repaired-system)
# Notes
- Risks