ECE568H1 Study Guide - Quiz Guide: Computer Security, Address Space Layout Randomization, Local Variable
Document Summary
Security fundamentals: computer systems have rules: some are enforced (explicit rules) but others are implicit due to assumptions (implicit rules), security vulnerabilities occur when those assumptions turn out to be false. Assumptions about the data, input, and user behaviour: a reliable system does what it is supposed to do most of the time. A secure system does what it is supposed to do 100% of the time: components of security: confidentiality, integrity, availability, confidentiality is the protection of data or resources from exposure. There are two aspects of information or resources that are important to conceal: the content and the existence: integrity is the trustworthiness of the data or resource. There are two important aspects of a resource or a piece of data: correctness of its contents and correctness of its origin: confidentiality and integrity are often provided by cryptographic algorithms. Their strength is often measured in terms of complexity (how long will it take to break the algorithm).