IDS 200 Lecture Notes - Lecture 7: User Interface, Target Corporation, Access Granted
Document Summary
Attack types: phishing, distributed denial of service, and more. Notable attacks/vulnerabilities from facebook, 2011 2016. Security and access are closely related concepts and, roughly, two sides of the same coin. The basic categories of security threats are: Physical the physical facilities and devices on which data are stored. Personnel the employees entrusted with maintaining adherence to security policies. Software the computerized rules for providing system security. Any of these can be the point of vulnerability for a major security breach. However, this course will largely focus on the software category. Any usable system must have some means of access (the. If the keys exist, they can be guessed, copied, stolen, or coopted. Security and access are both provided by an application-specific set of permission rules. If the access conditions are met, the user is granted access according to the account"s permission level. For customized privacy, facebook delegates some granting of permissions to its users (like using apps)