Podcast
Questions and Answers
What is the concept that allows parents to access their child's grades in eConestoga?
What is the concept that allows parents to access their child's grades in eConestoga?
Data integrity ensures that data is available to everyone.
Data integrity ensures that data is available to everyone.
False
What could be the consequences if another student was able to 'hack' into eConestoga and change your grades?
What could be the consequences if another student was able to 'hack' into eConestoga and change your grades?
Inaccurate grades, loss of trust in the system, and potential academic consequences
The CIA triad consists of _______________, _______________, and _______________.
The CIA triad consists of _______________, _______________, and _______________.
Signup and view all the answers
What is the purpose of backups in ensuring availability?
What is the purpose of backups in ensuring availability?
Signup and view all the answers
Security is only concerned with protecting computer systems.
Security is only concerned with protecting computer systems.
Signup and view all the answers
What is the balance between prevention and detection in security?
What is the balance between prevention and detection in security?
Signup and view all the answers
Match the security concept with its description:
Match the security concept with its description:
Signup and view all the answers
What is the main concern in the scenario where eConestoga is taken down in an apparent DDOS attack?
What is the main concern in the scenario where eConestoga is taken down in an apparent DDOS attack?
Signup and view all the answers
Where do you foresee the Internet/computing evolving into over the next 5-10 years?
Where do you foresee the Internet/computing evolving into over the next 5-10 years?
Signup and view all the answers
Study Notes
Confidentiality
- Ensuring the correct information is in use
- Data integrity: preventing unauthorized changes to data
- Example: if another student hacked into eConestoga and changed your grades
Integrity
- The ability to access a computer resource
- Importance of access varies depending on the domain (e.g., library resource, hospital system)
- Consequences of unavailable resources: impact on security
- Example: if eConestoga was taken down in an apparent DDOS attack and you had an assignment due
Availability
- Effort can be divided into two areas: prevention and detection
- Prevention: stopping security breaches before they occur (e.g., username/password)
- Detection: alerting once a breach has occurred (e.g., burglar alarm)
- Safeguards: backups, network monitoring tools, and redundant pairs
CIA (Confidentiality, Integrity, Availability)
- Heavily dependent on domain requirements
- Balance between prevention and detection is crucial
- Security is a vast topic that goes beyond computer systems to include users and environment
- Many principles guide decision-making, with no one correct answer
- CIA provides a guide to what to protect and prioritize
Future of Computing and Security
- The Internet and computing have expanded greatly since their humble beginnings
- Current trend: smart devices (e.g., smart phones, cars, watches, homes)
- Foreseeing the future of computing/internet: next 5-10 years
- Potential security issues: various areas to consider and prepare for
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Understanding the importance of confidentiality, integrity and permissions in maintaining the security of personal grades and data in eConestoga.