What is security composed of?
Threat and risk assessment
detection and prevention
stategies and tools
remediation
Security Focus areas
Network
System (individual servers)
Access Control
Application
Data
Cloud
Types of security attacks
DoS Denial of Service
DDos Distributed denial of service
MITM man in the middle
Malware (viruses trojans spyware etc)
Software (vulnerabilites within software are exploited)
Internal (disgruntled employee as an example)