From 8e48a5001b95c44fed72cb9c60a15bc804b835b4 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Wed, 13 Jul 2022 19:37:16 +1200 Subject: [PATCH] vault backup: 2022-07-13 19:37:16 --- content/notes/01-big-picture.md | 28 +++++++++++++++++++++++++++- content/notes/comp-210.md | 3 +++ 2 files changed, 30 insertions(+), 1 deletion(-) diff --git a/content/notes/01-big-picture.md b/content/notes/01-big-picture.md index fd2fd46d4..c150cfa22 100644 --- a/content/notes/01-big-picture.md +++ b/content/notes/01-big-picture.md @@ -59,6 +59,32 @@ can all be sources of attacks - e.g., back: inside knowledge of faults within the business, that can be exploited # CIA Triad +how security has been appraoched by industry for ages + - Confidentiality + - having information protected from exposure + - blocking unauthorised access - Availability -- Integ \ No newline at end of file + - authentic state of information + - preventing corruption etc. + - e.g., checksum, hash check etc +- Integrity + - information being available to users without obstables + - DDoS + +Other models have been developed +- [slide](https://i.imgur.com/GJfb8Ph.png) + +# McCumber Cube +- a way to think about how to protect your information +- [slide](https://i.imgur.com/5Ls2yUp.png) + +- a map +- can be used to find "holes" + +# Access Security tradeoff +- perfect info security is impossible +- unrestricted access is dangerous +- completely secure would not allow access to anyone +- balance is key + diff --git a/content/notes/comp-210.md b/content/notes/comp-210.md index 4956b2feb..7813d505d 100644 --- a/content/notes/comp-210.md +++ b/content/notes/comp-210.md @@ -9,6 +9,9 @@ tags: --- # Assignments +No final exam +- [assignment 1](notes/01-security-audit) +- [assignment 2](notes/02-repaired-system) # Notes - Risks