vault backup: 2022-07-23 15:51:13

This commit is contained in:
Jet Hughes 2022-07-23 15:51:13 +12:00
parent 1aa9961ed2
commit f9e905d752
3 changed files with 25 additions and 6 deletions

View File

@ -8,5 +8,8 @@ tags:
Security had been split into three main areas
- Confidentiality -> Information should be protected from exposure
- Availability -> Information should not be corrupte
- Integrity
- Availability -> Information should not be corrupted
- Integrity -> Information should be available users without obstacles
![slide](https://i.imgur.com/GJfb8Ph.png)

View File

@ -15,10 +15,10 @@ No final exam
# Notes
[mccumber-cube](notes/mccumber-cube.md)
[access-security-tradeoff](notes/access-security-tradeoff.md)
[[]]
- [mccumber-cube](notes/mccumber-cube.md)
- [access-security-tradeoff](notes/access-security-tradeoff.md)
- [cia-triad](notes/cia-triad.md)
-
-
- Risks

View File

@ -0,0 +1,16 @@
---
title: "security-big-picture"
aliases:
tags:
- comp210
---
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
>[!Definition]
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
> (ISO27000 Information Security Management Systems Overview and Vocabulary)
There is a continuous need for IS as the environement around it is rapidly changing.
In