Cyber Security Terms
Cyber Security Terms
gov/resources-tools/resources/free-
cybersecurity-services-and-tools
https://ccdcoe.org/research/tallinn-manual/
Physical attack: A security incident that affects not only digital but also
physical environments where the incident is deployed
Availability: The idea that data is accessible to those who are authorized
to access it
Confidentiality: The idea that only authorized users can access specific
assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps
inform how organizations consider risk when setting up systems and
security policies
Integrity: The idea that the data is correct, authentic, and reliable
Vulnerabilities
Security principles
Next, you’ll learn about four additional OWASP security principles that
cybersecurity analysts and their teams use to keep organizational
operations and people safe.
Fail securely
The security of key systems should not rely on keeping details hidden.
Consider the following example from OWASP (2016): OWASP Mobile Top 10
The security of an application should not rely on keeping the source code
secret. Its security should rely upon many other factors, including
reasonable password policies, defense in depth, business transaction
limits, solid network architecture, and fraud and audit controls.
Key takeaways