Notes in Sikkerhet

To Subscribe, use this Key


Status Last Update Fields
Published 12/01/2023 Which principles does the CIA - triad contain?
Published 12/03/2023 What do we mean about the term confidentiality?
Published 12/01/2023 What do we mean about the term integrity?
Published 12/03/2023 What do we mean about the term availability?
Published 12/03/2023 Which dimensions are in the "Cybersecurity Cube"?
Published 12/01/2023 What is symmetrical encryption?
Published 12/01/2023 What are the definition for security culture?
Published 12/01/2023 What are some factors that influence security culture?
Published 12/01/2023 What is the definition of a threat?
Published 12/01/2023 Which types of threat do we have?
Published 12/02/2023 Which categories do we have for threat actors?
Published 12/02/2023 Cyber attacks - Passwords
Published 12/02/2023 Cyber attacks - Network
Published 12/02/2023 Vulnerabilities
Published 12/02/2023 What is a zero-day attack?
Published 12/02/2023 What is the four domain of the Software Security Framework (SSF)
Published 12/02/2023 What is our goal for software security?
Published 12/02/2023 What is "STRIDE"?
Published 12/02/2023 What does the attack model "STRIDE" stand for?
Published 12/02/2023 What are the three most parts to analyse in an architecture analysis?
Published 12/03/2023 Open Web Application Security Project (OWASP) has made a list over the most important vulnerabilities for web applications, what are these?
Published 12/03/2023 You are expected to learn several things while attending university. This is mostly related to the concept of?
Published 12/03/2023 Orgaizations - Technical definition
Published 12/03/2023 Orgaizations - Behavioral definition
Published 12/03/2023 Organizations are devoted to a main principle, what is this?
Published 12/03/2023 What are the 8 features of an organization?
Published 12/03/2023 How can an organization achieve competitive advantage?
Published 12/03/2023 What are some categories of security appliances?
Published 12/03/2023 There are two main categories for firewalls, what are these?
Published 12/03/2023 Which phases does the Cyber Kill Chain contain?
Published 12/03/2023 What is behaviour-based security?
Published 12/03/2023 What kind of system (a physical device) can we use to aid us when using behaviour-based security?
Published 12/03/2023 Which four principle does the security model "continuous learning framework" consist of?
Published 12/03/2023 Which three dimensions are part of the cybersecurity cube?
Published 12/03/2023 Which models can we use to define risk?
Published 12/03/2023 What is the definition for the mathematical model for risk?
Published 12/03/2023 What is the three factor model definition for risk?
Published 12/03/2023 What should the system description include?
Published 12/03/2023 Why do we want our system to be resilience?
Status Last Update Fields