2024-01-22 10:57:09

This commit is contained in:
Isaac Shoebottom 2024-01-22 10:57:10 -04:00
parent 9abad0d6ea
commit 765146be94
4 changed files with 23 additions and 11 deletions

View File

@ -13,7 +13,7 @@
"state": {
"type": "markdown",
"state": {
"file": "README.md",
"file": "UNB/Year 4/Semester 2/STAT2593/2024-01-22.md",
"mode": "source",
"source": false
}
@ -85,7 +85,7 @@
"state": {
"type": "backlink",
"state": {
"file": "README.md",
"file": "UNB/Year 4/Semester 2/STAT2593/2024-01-22.md",
"collapseAll": false,
"extraContext": false,
"sortOrder": "alphabetical",
@ -102,7 +102,7 @@
"state": {
"type": "outgoing-link",
"state": {
"file": "README.md",
"file": "UNB/Year 4/Semester 2/STAT2593/2024-01-22.md",
"linksCollapsed": false,
"unlinkedCollapsed": true
}
@ -125,7 +125,7 @@
"state": {
"type": "outline",
"state": {
"file": "README.md"
"file": "UNB/Year 4/Semester 2/STAT2593/2024-01-22.md"
}
}
},
@ -158,8 +158,11 @@
},
"active": "e09960f7848825cf",
"lastOpenFiles": [
"UNB.md",
"UNB/Year 4/Semester 2/STAT2593/2024-01-19.md",
"UNB/Year 4/Semester 2/STAT2593/2024-01-22.md",
"README.md",
"UNB/Year 4/Semester 1/CS2418/9-15-2023.md",
"UNB.md",
"gcm-diagnose.log",
"Semester 2/STAT2593/2024-01-22.md",
"Semester 2/STAT2593/2024-01-19.md",
@ -188,9 +191,6 @@
"Semester 1/CS2418/10-18-2023.md",
"Semester 1/CS2418/10-20-2023.md",
"Semester 1/CS3418/10-23-2023.md",
"Semester 1/CS3418/10-20-2023.md",
"Semester 1/CS2418/10-16-2023.md",
"Semester 1/CS2418/10-13-2023.md",
"Semester 1/CS2418",
"Semester 1/CS3418"
]

View File

@ -1,2 +1,14 @@
# My Notes
[[UNB/]]
## UNB
### Year 1-3
Notes were taken either using OneNote, pencil and paper, or not at all lol
### Year 4
#### Semester 1
- CS2418: Intro to Information Security
- CS3418: Operating Systems 1
#### Semester 2
- CS2333: Computability and Formal Languages
- CS3873: Net-centric Computing
- STAT2593: Statistics for Engineers

View File

@ -2,9 +2,9 @@ Lecture Topic:
Security & Cryptographic Tools
# Security
Prevention: Ideally, no attack can be performed. The use of encryption, prevent unauthorized access, to prevent the loss of confidentiality of the system
Prevention: Ideally, no attack can be performed. The use of encryption, prevent unauthorised access, to prevent the loss of confidentiality of the system
Detection: If we cannot prevent, we should at least detect them. The use of intrusion detection systems, like firewalls, to log unauthorized access to system is important. An example of this would be denial of service detection so we can fall to a more available system
Detection: If we cannot prevent, we should at least detect them. The use of intrusion detection systems, like firewalls, to log unauthorised access to system is important. An example of this would be denial of service detection so we can fall to a more available system
Something 1