Lecture 1: Terms & Concepts

Terms you should know

Paul Krzyzanowski

September 11, 2020

- CIA Triad - Confidentiality - Privacy - Secrecy - Integrity - Data integrity, origin integrity, system integrity - Availability - Exfiltration - Hack-back - Prevention - Detection - Recovery - Forensics - Security Policy - Policy Language - Security Mechanism - Assurance - Security Architecture - Security Engineering - Risk Analysis - Vulnerability - Attack Vector - Exploit - Attack - Attack Surface - Threat - Adversary - Malicious Insider - White Hat vs. Black Hat Hackers - Disclosure - Deception - Disruption - Usurpation
- Snooping (Eavesdropping) - Modification (Alteration) - Masquerading (Spoofing) - Repudiation of Origin - Denial of Receipt - Delay - Denial of Service - Action at a Distance - Asymmetric Force - Anonymity - Lack of Distinction - Botnet - Command and Control Server - Social Engineering - Ransomware - Cryptojacking - Threat Matrix - Opportunistic vs. Targeted Threats - Unskilled vs. Skilled Threats - Stuxnet - Air Gap - Threat Models - Trusted Computing Base (TCB) - Supply Chain - Meltdown & Spectre - Security Theater - Principal (from the reading) - Subject (from the reading) - Authenticity vs. Integrity (from the reading)
Last modified September 12, 2020.
recycled pixels