vault backup: 2022-07-23 15:51:13

This commit is contained in:
Jet Hughes 2022-07-23 15:51:13 +12:00
parent 1aa9961ed2
commit f9e905d752
3 changed files with 25 additions and 6 deletions

View File

@ -8,5 +8,8 @@ tags:
Security had been split into three main areas Security had been split into three main areas
- Confidentiality -> Information should be protected from exposure - Confidentiality -> Information should be protected from exposure
- Availability -> Information should not be corrupte - Availability -> Information should not be corrupted
- Integrity - Integrity -> Information should be available users without obstacles
![slide](https://i.imgur.com/GJfb8Ph.png)

View File

@ -15,10 +15,10 @@ No final exam
# Notes # Notes
[mccumber-cube](notes/mccumber-cube.md) - [mccumber-cube](notes/mccumber-cube.md)
[access-security-tradeoff](notes/access-security-tradeoff.md) - [access-security-tradeoff](notes/access-security-tradeoff.md)
- [cia-triad](notes/cia-triad.md)
[[]] -
- -
- Risks - Risks

View File

@ -0,0 +1,16 @@
---
title: "security-big-picture"
aliases:
tags:
- comp210
---
Information security is the science of protecting information assets. These include data, systems, equipment, and infrastructure.
>[!Definition]
> "The preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.”
> (ISO27000 Information Security Management Systems Overview and Vocabulary)
There is a continuous need for IS as the environement around it is rapidly changing.
In