pk.org: CS 419/Lecture Notes

Introduction to Computer Security

Terms & concepts you should know

Paul Krzyzanowski – January 27, 2024
  • CIA Triad
  • Confidentiality
  • Privacy
  • Secrecy
  • Integrity
  • Data integrity
  • Availability
  • Exfiltration
  • Ransomware
  • Hack-backs
  • Prevention
  • Detection
  • Recovery
  • Forensics
  • Security Policy
  • Policy Language
  • Security Mechanism
  • Assurance
  • Security Architecture
  • Security Engineering
  • Risk Analysis
  • Vulnerability
  • Attack Vector
  • Exploit
  • Attack
  • Attack Surface
  • Threat
  • Adversary
  • Malicious Insider
  • Hat colors
  • Disclosure
  • Deception
  • Disruption
  • Usurpation
  • Snooping (Eavesdropping)
  • Modification (Alteration)
  • Masquerading (Spoofing)
  • Repudiation of Origin
  • Denial of Receipt
  • Delay
  • Denial of Service
  • Action at a Distance
  • Asymmetric Force
  • Anonymity
  • Lack of Distinction
  • Botnet
  • Command and Control Server
  • Social Engineering
  • Ransomware
  • Threat Matrix
  • Opportunistic vs. Targeted Threats
  • Unskilled vs. Skilled Threats
  • Script kiddies
  • White hat hackers, black hat hackers
  • Advanced Persistent Threats (APT)
  • Stuxnet
  • Air Gap
  • Threat Models
  • Trust boundary
  • Trusted Computing Base (TCB)
  • Supply chain attack
  • Meltdown & Spectre
  • Security Theater
  • Principal
  • Subject
  • Authenticity vs. Integrity