Software Security Basics
Last updated
Last updated
Vulnerability is a weakness in the security system.
(i.e., in procedures, design, or implementation), that might be exploited to cause loss or harm.
A threat to a computing system is a set of circumstances that has the potential to cause loss or harm.
a potential violation of security.
A human (criminal) who exploits a vulnerability perpetrates an attack on the system.
How do we address these problems?
We use a control as a protective measure.
That is, a control is an action, device, procedure, or technique that removes or reduces a vulnerability.
Software Deletion
Software Modification
Software Theft
A program works well most of the time but it fails in specific circumstances.
A program that overtly does one thing while covertly doing another.
A piece of code that is used to spread from one computer to another.
A program that has a secret entry point.
A piece of code that makes information accessible to unauthorized people or programs.
Confidentiality ensures that computer-related assets are accessed only by authorized parties.
i.e. reading, viewing, printing, or even knowing their existence.
Secrecy or privacy.
Integrity means that assets can be modified only by authorized parties or only in authorized ways.
i.e. writing, changing, deleting, creating.
Availability means that assets are accessible to authorized parties at appropriate times.
i.e. often, availability is known by its opposite, denial of service.