<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Cybersecurity on rkempe’s blog</title>
    <link>https://blog.rkempe.ca/tags/cybersecurity/</link>
    <description>Recent content in Cybersecurity on rkempe’s blog</description>
    <generator>Hugo</generator>
    <language>en-ca</language>
    <copyright>&amp;copy; Copyright 2026 Rebecca Kempe</copyright>
    <lastBuildDate>Sun, 09 Feb 2025 00:56:10 -0500</lastBuildDate>
    <atom:link href="https://blog.rkempe.ca/tags/cybersecurity/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>COMP 4108 Notes, Chapter 1: Security Principles and Why Security is Hard</title>
      <link>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-principles/</link>
      <pubDate>Sun, 09 Feb 2025 00:56:10 -0500</pubDate>
      <guid>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-principles/</guid>
      <description>Simplicity and necessity: designs should be as simple and small as possible. Minimize functionality, favour minimal installs, and disable unused functionality. Aka: minimize the attack surface. Safe defaults: deny-by-default. Design systems to fail closed (denying access) and favour allowlists over denylists.</description>
    </item>
    <item>
      <title>COMP 4108 Notes, Chapter 1: Important Ideas</title>
      <link>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-important-ideas/</link>
      <pubDate>Sun, 09 Feb 2025 00:03:10 -0500</pubDate>
      <guid>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-important-ideas/</guid>
      <description>When we study computer and internet security (aka cybersecurity, in most circles), we are primarily interested in how people interact with software, computer systems, and networks, and in how they can be misused by various agents. We are typically not concerned with unintentional mistakes or other types of damages (such as a network failure cause by an outage or a natural disaster).</description>
    </item>
    <item>
      <title>COMP 4108 Notes, Chapter 1: Definitions</title>
      <link>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-definitions/</link>
      <pubDate>Sun, 09 Feb 2025 00:01:10 -0500</pubDate>
      <guid>https://blog.rkempe.ca/resources/comp-4108-notes/chapter-1-definitions/</guid>
      <description>computer and Internet security: the combined art, science, and engineering practice of protecting software, computers, networks, the data stored on them, the information transmitted on/between them, and the physical devices/machines they control from intentional misuse by an unauthorized party.</description>
    </item>
  </channel>
</rss>
