ECE568H1 Study Guide - Quiz Guide: Computer Security, Address Space Layout Randomization, Local Variable

84 views4 pages

Document Summary

Security fundamentals: computer systems have rules: some are enforced (explicit rules) but others are implicit due to assumptions (implicit rules), security vulnerabilities occur when those assumptions turn out to be false. Assumptions about the data, input, and user behaviour: a reliable system does what it is supposed to do most of the time. A secure system does what it is supposed to do 100% of the time: components of security: confidentiality, integrity, availability, confidentiality is the protection of data or resources from exposure. There are two aspects of information or resources that are important to conceal: the content and the existence: integrity is the trustworthiness of the data or resource. There are two important aspects of a resource or a piece of data: correctness of its contents and correctness of its origin: confidentiality and integrity are often provided by cryptographic algorithms. Their strength is often measured in terms of complexity (how long will it take to break the algorithm).

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents