










Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of IT security concepts, focusing on the CIA Triad (Confidentiality, Integrity, Availability) and the risks associated with each. It covers the importance of confidentiality, types of risks such as legal, financial, reputational, and operational, and threats to confidentiality including access by unauthorized persons, intercepted data transfers, and privileged access by employees. It also discusses various types of malware, phishing attacks, and spamming. The document differentiates between Trojan horses and worms, and explains the concept of a virus. Additionally, it covers the TCP three-way handshake and DDoS attacks, specifically UDP flood attacks and HTTP flood attacks.
Typology: Study notes
1 / 18
This page cannot be seen from the preview
Don't miss anything!
Confidentiality Integrity Availability Secure
TCP 3-Way Handshake