mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-14 17:16:50
This commit is contained in:
parent
a54bbaf75d
commit
bda886bbb2
@ -11,10 +11,27 @@ tags:
|
||||
- [deakin university attack](https://australiancybersecuritymagazine.com.au/up-to-10000-students-targeted-in-deakin-university-cyberattack/)
|
||||
- staff credentials were leaked and acces to students information was gathered
|
||||
- [rusian hackers attack lithuania](https://www.reuters.com/world/europe/russian-hacker-group-says-cyber-attacks-continue-lithuania-2022-06-28/)
|
||||
-
|
||||
- [attacks against india](https://www.indiatoday.in/india/story/prophet-row-international-hackers-cyber-attacks-india-nupur-sharma-remark-1961941-2022-06-13)
|
||||
- [retbleed attack affects AMD and Intel CPUs (spectre-based speculative-execution attacks)](https://thehackernews.com/2022/07/new-retbleed-speculative-execution.html)
|
||||
|
||||
# Vulnerabilities
|
||||
- a potential weakness in an asset
|
||||
- or in its defense security control
|
||||
- e.g., flaws in software packages or an unprotected system port
|
||||
|
||||
exploit is the technique used to attack
|
||||
|
||||
- [RAND report r-609-1 (1979)](https://i.imgur.com/GEVLIq1.png)
|
||||
- need to be aware of vulnerabilities
|
||||
|
||||
e.g.,
|
||||
- websites can steal browser data via extension APIs
|
||||
|
||||
# Security services and control
|
||||
- services
|
||||
- the intended security goal or property (C.I.C provides the three main security services)
|
||||
- controls
|
||||
- the mechanisms employed to implement the services
|
||||
|
||||
# CIA
|
||||
|
||||
|
||||
Loading…
Reference in New Issue
Block a user