IDS 200 Lecture Notes - Lecture 7: User Interface, Target Corporation, Access Granted

14 views7 pages

Document Summary

Attack types: phishing, distributed denial of service, and more. Notable attacks/vulnerabilities from facebook, 2011 2016. Security and access are closely related concepts and, roughly, two sides of the same coin. The basic categories of security threats are: Physical the physical facilities and devices on which data are stored. Personnel the employees entrusted with maintaining adherence to security policies. Software the computerized rules for providing system security. Any of these can be the point of vulnerability for a major security breach. However, this course will largely focus on the software category. Any usable system must have some means of access (the. If the keys exist, they can be guessed, copied, stolen, or coopted. Security and access are both provided by an application-specific set of permission rules. If the access conditions are met, the user is granted access according to the account"s permission level. For customized privacy, facebook delegates some granting of permissions to its users (like using apps)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents