Cybersecurity Essentials: Threats, Controls, and Encryption
Classified in Computers
Written on in
English with a size of 4.71 KB
CIA Triad
The CIA Triad consists of Confidentiality, Integrity, and Availability. Related concepts include Authentication, Accountability, and Auditability.
Types of Harm
- Interception
- Interruption
- Modification
- Fabrication
Web Technologies
HTML
- GET: Embeds parameters into the URL.
- POST: Sends data directly to the server; more secure.
PHP
- PUT: Used to create or replace a file at the specified URL. Sends data like POST, more suitable for uploading files.
Penetration Testing
5 Steps to Penetration Testing:
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Clearing Tracks
Security Controls
- Prevention: Outright stopping an attack.
- Deterrence: Making an attack harder.
- Deflection: Making a target less attractive.
- Mitigation: Lessening the harm.
- Detection: Identifying