Lecture 1: Terms & Concepts
Terms you should know
Paul Krzyzanowski
September 11, 2020
- CIA Triad
- Confidentiality
- Privacy
- Secrecy
- Integrity
- Data integrity, origin integrity, system integrity
- Availability
- Exfiltration
- Hack-back
- Prevention
- Detection
- Recovery
- Forensics
- Security Policy
- Policy Language
- Security Mechanism
- Assurance
- Security Architecture
- Security Engineering
- Risk Analysis
- Vulnerability
- Attack Vector
- Exploit
- Attack
- Attack Surface
- Threat
- Adversary
- Malicious Insider
- White Hat vs. Black Hat Hackers
- Disclosure
- Deception
- Disruption
- Usurpation
- Snooping (Eavesdropping)
- Modification (Alteration)
- Masquerading (Spoofing)
- Repudiation of Origin
- Denial of Receipt
- Delay
- Denial of Service
- Action at a Distance
- Asymmetric Force
- Anonymity
- Lack of Distinction
- Botnet
- Command and Control Server
- Social Engineering
- Ransomware
- Cryptojacking
- Threat Matrix
- Opportunistic vs. Targeted Threats
- Unskilled vs. Skilled Threats
- Stuxnet
- Air Gap
- Threat Models
- Trusted Computing Base (TCB)
- Supply Chain
- Meltdown & Spectre
- Security Theater
- Principal (from the reading)
- Subject (from the reading)
- Authenticity vs. Integrity (from the reading)