Secure and Reliable Systems

Secure and Reliable Systems

Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. 1

  • Information Security : Information Security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
  • CIS Benchmark : The CIS Benchmarks are distributed free of charge in PDF format to propagate their worldwide use and adoption as user-originated, de facto standards.
  • Cloud Security : Cloud Security
  • Web Application Security : Web application security is a branch of information security that deals specifically with the security of websites, web applications, and web services.
  • Ethical Hacking : Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers make the World Wide Web work.
    • Kali Linux : Penetration Testing and Ethical Hacking Linux Distribution
    • Intrusion Detection System : An Intrusion Detection System (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations.
  • Attack Vectors : An attack vector is a path or means by which a hacker (or cracker) can gain access to a computer or network server in order to deliver a payload or malicious outcome.
    • Cross-Site Request Forgery (CSRF) : Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.
    • Cross-Site Scripting (XSS) : Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites.

Last edited by MichaelAlber .
Page last modified on Sunday February 5, 2023 14:15:29 PST.

Don't Panic