What is Information Security?
Information security means protecting data and systems from unauthorized access, use, or damage. The goal is to keep data safe from people who shouldn't have access to it, whether they intend to cause harm or not.
What are the three key concepts of Information Security?
Confidentiality: Keeping data private and only allowing authorized people to see it.
Integrity: Ensuring that data is not changed in an unauthorized way.
Availability: Making sure data and systems are accessible when needed.
What are the four types of attacks?
Interception: Unauthorized access to data (e.g., eavesdropping on a network).
Interruption: Making data or systems unavailable (e.g., shutting down a website).
Modification: Changing data in an unauthorized way (e.g., altering a document).
Fabrication: Creating false data or activities in a system (e.g., sending fake emails).
What is the difference between threats, vulnerabilities, and risks?
Threats: Potential dangers (e.g., hackers trying to steal data).
Vulnerabilities: Weaknesses that threats can exploit (e.g., weak passwords).
Risks: The chance that a threat will successfully exploit a vulnerability and cause harm.
What are the practices of secure software development?
Abuse Cases: Thinking about how hackers might misuse the software and planning defenses early during architecture & design phase
Architectural Risk Analysis: Identifying security weaknesses in the software’s design. For example by using Thread modelling also impacting already the architecture and design phase.
Code Review: Checking the source code for security mistakes that can be exploited as a security vulnarability. This can either be done using manual review or static analyse tools.
Risk-Based Security Testing: Running automated tests to check if vulnerabilities can be succesfully attacked. This can also include unit-, integration and system tests.
Penetration Testing: Simulating hacker attacks to test security and find any security holes.
Secure Operations: Keeping systems updated and monitoring them for security threats.
Last changed2 months ago