Terms in Security

Security Terms 

CIA triad 

CIA triad is the core aspect when designing security policy.

  • Confidentiality 
    • Measurement to prevent sensitive information from unauthorized access attempts. 
  • Integrity
    • Maintaining the consistency, accuracy and trustworthiness of data over its entire life cycle. 
    • Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people. 
  • Availability 
    • Information should be consistently and readily accessible for authorized parties.

Basic terms used in security 

  • Risk 
    • The possibility of suffering a loss in the event of an attack on the system 
  • Vulnerability
    • Flaw in a system that could be exploited to compromise the system 
    • 0-day vulnerability is a vulnerability that is not known to the software developer or vendor, but is known to an attacker
  • Exploit 
    • Software that is used to take advantage of a security bug or vulnerability
  • Threat
    • The possibility of danger that could exploit a vulnerability 
  • Hacker
    • Someone who attempts to break into or exploit a system 
    • Black and White hackers 
  • Attack 
    • An actual attempt at causing harm to a system
  • Malware 
    • Type of malicious software that can be used to obtain your sensitive information, or delete or modify files 

REFERENCE 

Comments

Popular posts from this blog

Cryptography

Various types of security attacks.