Skip to content

Commit

Permalink
Update security-key-concepts.md
Browse files Browse the repository at this point in the history
  • Loading branch information
gabrielle92 authored Feb 10, 2017
1 parent 295e48b commit 4eb6f0a
Showing 1 changed file with 7 additions and 1 deletion.
8 changes: 7 additions & 1 deletion pages/security-key-concepts.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,18 @@ access to a computer or network server in order to deliver a payload or
malicious outcome. Attack vectors enable hackers to exploit system
vulnerabilities, including the human element.

## threat modeling
## threat

> In computer security, a threat is a potential event that could undermine your efforts to defend your data. Threats can be intentional (conceived by attackers), or they could be accidental (you might leave your computer turned on and unguarded).
https://ssd.eff.org/en/glossary/threat

## risk analysis

> In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Assessing risk means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about.
https://ssd.eff.org/en/glossary/risk-analysis

## hardening

> Hardening your computer is an important step in the fight to protect your personal data and information. This process works to eliminate means of attack by patching threats and turning off inessential services. Hardening a computer involves using antivirus and antispyware protection, regularly downloading the latest manufacturers patches, and disabling unneeded software and applications, making computers harder to break into.
Expand Down

0 comments on commit 4eb6f0a

Please sign in to comment.