Introduction
-
There is no such thing as absolute computer security
-
Theory is not the same as practice
CIA triangle
The CIA triangle states three key principles to consider in any secure system.
-
Confidentiality - No unauthorised disclosure
-
Integrity - No unauthorised change
-
Availability - Users who should be able to access something are able to
Terminology
-
Worm/virus - Self-replicating program which spreads across a network
-
DOS - Denial of Service, when a service is overwhelmed by a abnormally high volume of traffic
-
Social engineering - Exploiting a person to access a system
-
Asset - Anything of value which needs to be protected, such as a database, device or reputation
-
Vulnerability - A flaw in the design, implementation, operation or management of a system which can be exploited, such as weak passwords or a bug in a program
-
Threat - The potential for a security violation which occurs when an attacker has capability and intention
-
Risk - The expected loss given the threat, vulnerability and result
-
Attack - an assault on security from actioning a threat
-
Countermeasure - An action which prevents vulnerabilities, attacks or lessens their effects