

The design of security systems also has three goals. We saw that computer security addressed three areas of concern. There are no magic solutions … but there is a lot that can be done to mitigate the risk of attacks and their resultant damage. Microsoft wouldn’t have monthly security updates. Massive security breaches year after year. Third-party libraries, and multiple administrators. We may have a mix of cloud and local resources,

Large systems may comprise tens or hundreds of millions Availability Availability means that the system is available for use and performs properly.Ī denial of service (DoS) attack may not steal data or damage any files but may cause a system It also means protecting the system against against accidental damage, such as from user or programmer errors. Maintaining integrity means not just defending against intruders that want to modify a program or masquerade as others. Processes are running the way they are supposed to. System integrity means that the entire computing system is working properly that it has not been damaged or subverted. Recipient integrity means that the person or system receiving a message truly is that person and not an imposter. Origin integrity means that the person or system sending a message or creating a file truly is that person and not an imposter. That everything is as you expect it to be: users are not imposters and processesĭata integrity means that the data in a system has not been corrupted. Integrity refers to the trustworthiness of a system. Someone being able to access a protectedįile containing your medical records without proper access rights is a violation While confidentiality provides a means to block access to such information.

Privacy specifies limits on what information can be shared with others Only authorized people and processes should have access. (the devices it connects to and its ability to run programs) available toĮveryone. Confidentiality Confidentiality means that we do not make a system’s data and its resources These three are known as the CIA Triad (no relation to the Central Intelligence Agency). Specifically, this means safeguarding three areas: confidentiality, integrity, and availability. Finally,ĭon't take the three hour time window in the title literally.Ĭomputer security is about keeping computers, their programs, and the data they manage “safe.” Necessarily cover everything that one needs to know for the exam. Important topics that may be covered on the final exam but does not claim to This study guide attempts to touch upon the most Final exam study guide The three-hour study guide for the final exam
