Introduction to Computer Security
Terms &Concepts you should know
Paul Krzyzanowski
January 27, 2024
- CIA Triad
- Confidentiality
- Privacy
- Secrecy
- Integrity
- Data integrity, origin integrity, system integrity
- Availability
- Exfiltration
- Ransomware
- Hack-backs
- Prevention
- Detection
- Recovery
- Forensics
- Security Policy
- Policy Language
- Security Mechanism
- Assurance
- Security Architecture
- Security Engineering
- Risk Analysis
- Vulnerability
- Attack Vector
- Exploit
- Attack
- Attack Surface
- Threat
- Adversary
- Malicious Insider
- White Hat vs. Black Hat Hackers
- Disclosure
- Deception
- Disruption
- Usurpation
- Snooping (Eavesdropping)
- Modification (Alteration)
- Masquerading (Spoofing)
- Repudiation of Origin
- Denial of Receipt
- Delay
- Denial of Service
- Action at a Distance
- Asymmetric Force
- Anonymity
- Lack of Distinction
- Botnet
- Command and Control Server
- Social Engineering
- Ransomware
- Threat Matrix
- Opportunistic vs. Targeted Threats
- Unskilled vs. Skilled Threats
- Script kiddies
- White hat hackers, black hat hackers
- Advanced Persistent Threats (APT)
- Stuxnet
- Air Gap
- Threat Models
- Trust boundary
- Trusted Computing Base (TCB)
- Supply chain attack
- Meltdown & Spectre (not how they work; just what they affected)
- Security Theater (from the reading)
- Principal (from the reading)
- Subject (from the reading)
- Authenticity vs. Integrity (from the reading)