Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
hosting [2014/01/11 00:46] anonymoushosting [2014/01/11 01:05] anonymous
Line 1: Line 1:
 ====== Tips for self-hosting ====== ====== Tips for self-hosting ======
 ===== Security levels of hosting methods ===== ===== Security levels of hosting methods =====
-This section gives a list of methods in which ways it is possible to setting up own services and describes its advantages and disadvantages.+This section gives a list of methods in which ways it is possible to setting up own services and describes its advantages and disadvantages. Besides that, it gives information about which threats are higher or lower by using the corresponding method. We distinguish between 6 threats[0]: 
 + 
 +  * **Confidentiality** is keeping assets or knowledge about assets away from unauthorized parties. 
 +  * **Integrity** is keeping assets undamaged and unaltered. 
 +  * **Availability** is the assurance that assets are available to parties authorized to use them. 
 +  * **Consistency** is when assets behave and work as expected, all the time. 
 +  * **Control** is the regulation of access to assets. 
 +  * **Audit** is the ability to verify that assets are secure. 
 ==== Using services on free service providers (e.g. wordpress.com) ==== ==== Using services on free service providers (e.g. wordpress.com) ====
 +DESCRIPTION
 +  * **Confidentiality**:
 === Advantages === === Advantages ===
   * easy setup   * easy setup
Line 19: Line 29:
 ==== Hosting services on your own in more secure location ==== ==== Hosting services on your own in more secure location ====
  
 +[0] https://ssd.eff.org/risk/threats