What is the primary goal of cybersecurity?
Protecting a computing asset from harm.
What are some computer assests?
● Computer hardware
● Software
● Data
What are some harms?
● Physical damage
● Unauthorised change, unauthorised use
● Denial of service
● Theft
What does “harms” mean in the context of cybersecurity?
Any negative impact on computing assets, such as physical damage, unauthorized change or use, denial of service, or theft.
-> may not be for monetary reasons but usually some benefit to someone in causing it
Define computer assets.
● Anything the computer system controls
What are risks?
● What could go wrong? – a hazard
● What would be the consequences?
● What are the chances of it happening?
How do we naively measure risk?
risk = expected cost x probability
Why is the risk calculation naive?
Cannot always estimate cost of an incident nor the probability of it happening.
What are the qualitive measures of risk?
What are threats?
Something that tries to break system security.
How are threats studied?
In a threat model.
What do threats show?
The attack points of a system.
How are threats ranked?
By risk.
What is an attack in system security?
An attempt to exploit a threat by technical or non‑technical means.
What is an attack vector?
The path or exploit used to carry out an attack.
Example of a direct attack?
Stealing a password.
Example of an indirect attack?
Sending a virus email that steals the password.
What does identity mean in security?
Proving you are who you say you are.
What does identity decide about information?
What you are allowed to see (information hiding).
What does identity decide about actions?
What you are allowed to do (agency).
What is privacy in security?
Only people with permission can see the information.
What are the degrees of privacy?
Why is hidden information safer?
It’s hard to attack something you don’t know exists.
What is authentication?
Proving a claimed identity.
Showing you are who you say you are.