Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link : http://technicdynamic.com
The purpose of this document is to familiarize readers with the basics of computer security, as defined in ISO 7498-2, for example.
The objectives of computer security
Computer security has several objectives, of course related to the types of threats and types of resources, etc ...However, the main points points are:
prevent the unauthorized disclosure of data
prevent the unauthorized modification of data
prevent the unauthorized use of network resources or computer in general
The scope of information security
These objectives apply in different areas or fields of applications, each using different techniques to attain the same objectives, and these fields are:
physical security programs (screens, power cables, power consumption curves ...)
the security of operating systems
communications security
Terminology of computer security
Computer security uses a well-defined vocabulary that we use in our articles.In order to understand these articles, it is necessary to define some terms:
Vulnerabilities: what are the security vulnerabilities in one or more systems. Any system as a whole has seen vulnerabilities, which can be exploited or not.
Attacks (exploits) represent the means to exploit a vulnerability. There may be several attacks for the same vulnerability but all vulnerabilities are not exploitable.
The cons-measures: these are the procedures or techniques to address a vulnerability or to counter a specific attack (in which case there may be other attacks on the same vulnerability).
Threats: These are determined opponents can mount an attack exploiting a vulnerability.
For other definitions, see ISO 7498-2 defines no fewer than 59 words, while other definitions are also available in our lexicon.