quartz/content/notes/02-concepts-and-roles.md
2022-07-14 17:16:50 +12:00

1.6 KiB

title aliases tags
02-concepts-and-roles
comp210

News

Vulnerabilities

  • a potential weakness in an asset
    • or in its defense security control
  • e.g., flaws in software packages or an unprotected system port

exploit is the technique used to attack

e.g.,

  • websites can steal browser data via extension APIs

Security services and control

  • services
    • the intended security goal or property (C.I.C provides the three main security services)
  • controls
    • the mechanisms employed to implement the services

CIA

Privacy and Actions

Shared responsibility

Balance