2024-01-22 10:57:09
This commit is contained in:
@ -2,9 +2,9 @@ Lecture Topic:
|
||||
Security & Cryptographic Tools
|
||||
|
||||
# Security
|
||||
Prevention: Ideally, no attack can be performed. The use of encryption, prevent unauthorized access, to prevent the loss of confidentiality of the system
|
||||
Prevention: Ideally, no attack can be performed. The use of encryption, prevent unauthorised access, to prevent the loss of confidentiality of the system
|
||||
|
||||
Detection: If we cannot prevent, we should at least detect them. The use of intrusion detection systems, like firewalls, to log unauthorized access to system is important. An example of this would be denial of service detection so we can fall to a more available system
|
||||
Detection: If we cannot prevent, we should at least detect them. The use of intrusion detection systems, like firewalls, to log unauthorised access to system is important. An example of this would be denial of service detection so we can fall to a more available system
|
||||
|
||||
Something 1
|
||||
|
||||
|
Reference in New Issue
Block a user