2.1 Common Threats Flashcards
2.1.1 Threat Domains
A threat domain is considered to be an area of control, authority, or protection that attackers can exploit to gain access to a system.
2.1.2 Types of Cyber Threats
Cyber threats can be classified into different categories. This allows organizations to assess the likelihood of a threat occurring and understand the monetary impact of a threat so that they can prioritize their security efforts.
Software attacks
A successful denial-of-service (DoS attack)
A computer virus
Software errors
A software bug
An application going offline
A cross-site script or illegal file server share
Sabotage
An authorized user successfully penetrating and compromising an organization’s primary database
The defacement of an organization’s website
Human errors
Inadvertent data entry errors
A firewall misconfiguration
Theft
Laptops or equipment being stolen from an unlocked room
Hardware failures
Hard drive crashes
Utility interruption
Electrical power outages
Water damage resulting from sprinkler failure
Natural disasters
Severe storms such as hurricanes or tornados
Earthquakes
Floods
Fires
2.1.3 Internal vs External Threats
Threats can originate from both within and outside of an organization, with attackers seeking access to valuable sensitive information such as personnel records, intellectual property, and financial data.
Internal threats are usually carried out by current or former employees and other contract partners who accidentally or intentionally mishandle confidential data or threaten the operations of servers or network infrastructure devices by connecting infected media or by accessing malicious emails or websites.
The source of an external threat typically stems from amateur or skilled attackers who can exploit vulnerabilities in networked devices or can use social engineering techniques, such as trickery, to gain access to an organization’s internal resources.
2.1.5 User Threats and Vulnerabilities
A user domain includes anyone with access to an organization’s information system, including employees, customers, and contract partners. Users are often considered to be the weakest link in information security systems, posing a significant threat to the confidentiality, integrity, and availability of an organization’s data.
No awareness of security
Users must be aware of and understand an organization’s sensitive data, security policies and procedures, technologies, and countermeasures that are implemented in order to protect information and information systems.
Poorly enforced security policies
All users must be aware of and understand an organization’s security policies, as well as the consequences of non-compliance.
Data Theft
Data stolen by users can pose a significant financial threat to organizations, both in terms of the resulting damage to their reputation and the legal liability associated with the disclosure of sensitive information.