Introduction to Computer Security

Terms &Concepts you should know

Paul Krzyzanowski

January 27, 2024

  • CIA Triad
  • Confidentiality
  • Privacy
  • Secrecy
  • Integrity
  • Data integrity, origin integrity, system integrity
  • Availability
  • Exfiltration
  • Ransomware
  • Hack-backs
  • Prevention
  • Detection
  • Recovery
  • Forensics
  • Security Policy
  • Policy Language
  • Security Mechanism
  • Assurance
  • Security Architecture
  • Security Engineering
  • Risk Analysis
  • Vulnerability
  • Attack Vector
  • Exploit
  • Attack
  • Attack Surface
  • Threat
  • Adversary
  • Malicious Insider
  • White Hat vs. Black Hat Hackers
  • Disclosure
  • Deception
  • Disruption
  • Usurpation
  • Snooping (Eavesdropping)
  • Modification (Alteration)
  • Masquerading (Spoofing)
  • Repudiation of Origin
  • Denial of Receipt
  • Delay
  • Denial of Service
  • Action at a Distance
  • Asymmetric Force
  • Anonymity
  • Lack of Distinction
  • Botnet
  • Command and Control Server
  • Social Engineering
  • Ransomware
  • Threat Matrix
  • Opportunistic vs. Targeted Threats
  • Unskilled vs. Skilled Threats
  • Script kiddies
  • White hat hackers, black hat hackers
  • Advanced Persistent Threats (APT)
  • Stuxnet
  • Air Gap
  • Threat Models
  • Trust boundary
  • Trusted Computing Base (TCB)
  • Supply chain attack
  • Meltdown & Spectre (not how they work; just what they affected)
  • Security Theater (from the reading)
  • Principal (from the reading)
  • Subject (from the reading)
  • Authenticity vs. Integrity (from the reading)
Last modified January 27, 2024.
recycled pixels