System Failiures
Hooman Behavior
Data & Privacy
Desgin Trade-offs
Real-World Impact
100

A security problem that stats with one user but spreads through a system

Cascading Failiure

100

A social engineering tactic that pressuers quick action

urgency


100

information that should be prtected because it can cause harm if exposed

sensitive data


100

A security feature that adds protection but adds an extra step.

multi-factor authentication

100

When individual actions have consequences beyond one person.

systemic impact

200
When on ei compromised account can access too many reosources

Excessive permissions or lack of least privilege

200

When attackers pretend to be someone you alreaduy trust

impersonation or familiarity

200

Why breaches of genetic or health data affect more than one person

shared or inherited data

200

Why companies sometimes weaken security controls.

prioritizing convenience or growth

200

A common result of major data breaches for organizations.

loss of public trust

300

A failiure caused bty assuming users will always behave correctly

poor system design

300

The use of fear, excitement, or authority to override logic

emotional manipulation

300

A type of data that cannot realistically be changed after a breach.

biometric or genetic data

300

The balance between usability, security, and cost

Tradeoffs

300

Why cybersecurity is not only a technical problem.

it involves people and systems

400

A security issue that occurs becaus sytms are tightly connected

interdependence risk

400

Wjy imntelligent, experienceusers still fall for scams

cognitive overload or social pressure

400

Why anonymized data can sometimes still identify individuals

data re-identification


400

A design strategy that layers multiple defenses.

defense in depth or In-Depth Defense

400

A societal consequence of large-scale data collection and misuse.

discrimination, surveillance, or inequality

500
A system design flkaw that allows small mistakes to cause large scale damage

Single point of failiure

500

A behavioral assumption system designers must plan for

users will make mistakes

500

A long term societal risk caused by repreated privacy breachers

Erosion of trust in technology or instututions

500

A principle that limits damage even after a breach occurs

least privilege or limited privileges

500

The core takeaway about computing systems

computing impacts individuals, organizations, and society