Pillars and Access Control
Pillars and Access Control
• Attacks
• A deliberate action taken to exploit a vulnerability in an organization's security defenses.
• Threats
• A potential danger to an organization's information assets, systems, or operations.
• Vulnerabilities
• Weakness, holes that threats can exploit to harm the organizations.
• Risks
• The potential for loss, damage or destruction of assets or data.
• Impact
• Impact considers the value of the asset being threatened and uses it to calculate risk.
• Information security architectures and frameworks are the basis for building a secure system.
• However, this doesn’t mean the system will always be 100% safe.
Authentication Authorization
System access
Data access