mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 13:24:05 -06:00
vault backup: 2022-07-13 19:27:16
This commit is contained in:
parent
8333998c11
commit
cbc1ad833e
@ -5,4 +5,60 @@ tags:
|
||||
- comp210
|
||||
---
|
||||
|
||||
# In the news
|
||||
|
||||
- [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html)
|
||||
-
|
||||
|
||||
# Why info sec
|
||||
- more interconnected
|
||||
- more exposure
|
||||
- software devs need to know about security
|
||||
- often security is an afterthought
|
||||
- this is bad
|
||||
- IS proatects the ability of an organisation to function
|
||||
- also protects reputation
|
||||
|
||||
# What is security
|
||||
- protecting assets from harm or damage
|
||||
- related concepts
|
||||
- nation security (political security)
|
||||
- safety (health)
|
||||
- environmental security (clean environement)
|
||||
- information security
|
||||
- economic security (stability of ecomony)
|
||||
|
||||
# What is information secuity
|
||||
- focus of protecting information assets
|
||||
- data, systems, equipment, infrastructure
|
||||
- intentional and accidental risks
|
||||
|
||||
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
||||
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
||||
|
||||
# Continuous need
|
||||
- environment is rapidly changing
|
||||
- innovation is rapid
|
||||
- cloud computing
|
||||
- more ICT capabilities introduce new attack vectors
|
||||
|
||||
# Components of Info systems
|
||||
can all be sources of attacks
|
||||
|
||||
- data
|
||||
- e.g., bank: unauthorised acces to data
|
||||
- people
|
||||
- e.g., social engineering
|
||||
- hardware
|
||||
- e.g., physical security (usually)
|
||||
- software
|
||||
- e.g., most common
|
||||
- netowrk
|
||||
- e.g., lost os possibilities for attack
|
||||
- procedures
|
||||
- e.g., back: inside knowledge of faults within the business, that can be exploited
|
||||
|
||||
# CIA Triad
|
||||
- Confidentiality
|
||||
- Availability
|
||||
- Integ
|
||||
@ -1,11 +1,11 @@
|
||||
---
|
||||
title: "cosc-210"
|
||||
title: "comp-210"
|
||||
aliases: Information Assurance
|
||||
year: 2022
|
||||
semester: 2
|
||||
tags:
|
||||
- course
|
||||
- cosc210
|
||||
- comp210
|
||||
---
|
||||
|
||||
# Assignments
|
||||
@ -14,5 +14,5 @@ tags:
|
||||
## 2022 s2
|
||||
- [cosc-203](notes/cosc-203.md)
|
||||
- [cosc-204](notes/cosc-204.md)
|
||||
- [cosc-210](notes/cosc-210.md)
|
||||
- [comp-210](notes/comp-210.md)
|
||||
- [math-202](notes/math-202.md)
|
||||
|
||||
Loading…
Reference in New Issue
Block a user