Why security is important?
Complexity is the enemy of security
Keep It Simple Stupid
Definition: ICT security
Risk estimation
The risk is estimated by considering the impact of an event/attack and the probability of that event/attack happening.

System development lifecycle | Security Dev. lifecycle
Security must be addressed at each step of the development.

Definition: Incident
A security event that compromises integrity, confidentiality or availability of an information asset.
Definition: Breach
(Data) breach: an incident tha exposes or potentially exposes data.
Definition: Disclosure
(Data) disclosure: a breach with confirmation that the data was disclosed by an unauthorized party. (Another entity has the data an knows it
Definition: Window of Exposure (WoE)
The period from the discovery of the vulnerability to the installation of the protection measure.

WoE: responsible disclosure
Security researchers will wait for some days to make public a vulnerability to make sure the developer can fix the vulnerability.
Example of flow:
Bruce Schneier on Computer Security: Will We Ever Learn?
Security principles:
Security in-depth
Do not rely on a single protection, if that fails you are vulnerable. Put in place secondary measures.
Security by design
Start the project/feature with security in mind. Build the project/feature around security.
Don’t add security at the end or “if there’s time.”
Least privilege
Assign to the entity that needs privileges the lowest one that allows it to achives its task.
Need-to-kwow
Similar to least privilege. Only show/transmit the data that the entity strictly-needs to accomplish the task it requested the data for.
Security by default
Allow security options by default.
E.g. users have to opt-out of security features if they don’t want them.
European Central Bank security recommendations
Security Properties:
Peer authentication
Only one entity asks for proof of authentication.
Example: computer asks username/password to user.
User doesn’t ask the computer to authenticate itself.
Mutual authentication
Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols.
Data authentication
Data authentication is the process of confirming the origin and integrity of data.
Non repudiation
Non-repudiation refers to a situation where a statement’s author cannot successfully dispute its authorship or the validity of an associated contract.
In digital security, non-repudiation means:
Authorization
The system must be able to ask the following question and gives itself an answer:
does the following entity have permission to do what it’s asking me to do?
Example: can Barbara borrow Alice’s car?