Computer Security — Appunti TiTilda

Indice

Introduction

A secure system defends against external threats, while a safe system does not cause harm.

CIA Paradigm

A secure system must satisfy the CIA paradigm:

Confidentiality and Integrity are in conflict with Availability. Security requires finding appropriate tradeoffs between these pillars.

Risk Assessment Components

To assess risk, it’s important to understand the following components:

An exploit implies a vulnerability exists, but a vulnerability can exist without an available exploit.

Security Levels

Risk

Risk is a statistical and economic evaluation of exposure to damage due to the presence of vulnerabilities and threats:

\text{Risk} = \underbrace{\text{Asset} \times \text{Vulnerability}}_{\text{controllable factors}} \times \underbrace{\text{Threats}}_{\text{independent factors}}

Key observations:

Security Strategy

Security focuses on reducing vulnerabilities and containing damage at acceptable costs (involving tradeoffs between security and usability/performance).

Ultima modifica:
Scritto da: Andrea Lunghi