mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-24 21:34:06 -06:00
vault backup: 2022-07-13 19:27:16
This commit is contained in:
parent
8333998c11
commit
cbc1ad833e
@ -5,4 +5,60 @@ tags:
|
|||||||
- comp210
|
- comp210
|
||||||
---
|
---
|
||||||
|
|
||||||
|
# In the news
|
||||||
|
|
||||||
|
- [Axie hack](https://thehackernews.com/2022/07/hackers-used-fake-job-offer-to-hack-and.html)
|
||||||
|
-
|
||||||
|
|
||||||
|
# Why info sec
|
||||||
|
- more interconnected
|
||||||
|
- more exposure
|
||||||
|
- software devs need to know about security
|
||||||
|
- often security is an afterthought
|
||||||
|
- this is bad
|
||||||
|
- IS proatects the ability of an organisation to function
|
||||||
|
- also protects reputation
|
||||||
|
|
||||||
|
# What is security
|
||||||
|
- protecting assets from harm or damage
|
||||||
|
- related concepts
|
||||||
|
- nation security (political security)
|
||||||
|
- safety (health)
|
||||||
|
- environmental security (clean environement)
|
||||||
|
- information security
|
||||||
|
- economic security (stability of ecomony)
|
||||||
|
|
||||||
|
# What is information secuity
|
||||||
|
- focus of protecting information assets
|
||||||
|
- data, systems, equipment, infrastructure
|
||||||
|
- intentional and accidental risks
|
||||||
|
|
||||||
|
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
|
||||||
|
> (ISO27000 Information Security Management Systems – Overview and Vocabulary)
|
||||||
|
|
||||||
|
# Continuous need
|
||||||
|
- environment is rapidly changing
|
||||||
|
- innovation is rapid
|
||||||
|
- cloud computing
|
||||||
|
- more ICT capabilities introduce new attack vectors
|
||||||
|
|
||||||
|
# Components of Info systems
|
||||||
|
can all be sources of attacks
|
||||||
|
|
||||||
|
- data
|
||||||
|
- e.g., bank: unauthorised acces to data
|
||||||
|
- people
|
||||||
|
- e.g., social engineering
|
||||||
|
- hardware
|
||||||
|
- e.g., physical security (usually)
|
||||||
|
- software
|
||||||
|
- e.g., most common
|
||||||
|
- netowrk
|
||||||
|
- e.g., lost os possibilities for attack
|
||||||
|
- procedures
|
||||||
|
- e.g., back: inside knowledge of faults within the business, that can be exploited
|
||||||
|
|
||||||
|
# CIA Triad
|
||||||
|
- Confidentiality
|
||||||
|
- Availability
|
||||||
|
- Integ
|
||||||
@ -1,11 +1,11 @@
|
|||||||
---
|
---
|
||||||
title: "cosc-210"
|
title: "comp-210"
|
||||||
aliases: Information Assurance
|
aliases: Information Assurance
|
||||||
year: 2022
|
year: 2022
|
||||||
semester: 2
|
semester: 2
|
||||||
tags:
|
tags:
|
||||||
- course
|
- course
|
||||||
- cosc210
|
- comp210
|
||||||
---
|
---
|
||||||
|
|
||||||
# Assignments
|
# Assignments
|
||||||
@ -14,5 +14,5 @@ tags:
|
|||||||
## 2022 s2
|
## 2022 s2
|
||||||
- [cosc-203](notes/cosc-203.md)
|
- [cosc-203](notes/cosc-203.md)
|
||||||
- [cosc-204](notes/cosc-204.md)
|
- [cosc-204](notes/cosc-204.md)
|
||||||
- [cosc-210](notes/cosc-210.md)
|
- [comp-210](notes/comp-210.md)
|
||||||
- [math-202](notes/math-202.md)
|
- [math-202](notes/math-202.md)
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user