8.1.4 Potential physical vulnerabilities to systems, data and information Flashcards
Fill The Blank:
Some companys run vulnerability testing (aka …………………… testing) when the digital system is being created and ………………
Vulnerability, Penetration, Installed
Fill The Blank:
………………….. testing when the computer system is running to identify …………………. and steps can be taken to close them before an attack is successful
Vulnerability, Vulnerability
Fill The Blank:
The biggest threat to digital systems is the ………… so they must be made aware of the vulnerabilities so that they do not become the start of any issues
User
State:
The 2 categories that physical threats can be split into
- Internal
- External
Explain:
Two factors affecting the location of physical systems and how these could be mitigated against
Internal Threats
- Area with limited flammable material to limit fire risk (fire alarm system should be installed)
- Low humidity/ventilation because heat can become humidity and components can corrode or be damaged to the point of not working as intended - Climate controlled area to regulate humidity and temperature
Fill The Blanks:
The ………….. of digital systems should also be considered as this can also be a ……………………..
Internal Threats
Layout, Vulnerability
State:
3 examples of physical threats to a system that link to the layout
Internal Threats
3 of:
* Door access codes not being updated regularly
* Using simple access codes such as 1234
* Reusing access codes on a rotation basis
* Lack of monitoring of access to secure areas
* Unnecessary access to secure areas
Fill The Blank:
When a digital system is installed it can be assumed the hardware and software will be up to date and can be classed as ……………..
Internal Threats
Robust
Fill The Blank:
Over a systems lifetime …………….. must be carried out. Eventually software will be become …………….. or (possibly earlier on) be classed as ……………….. software because there is limited support for interaction with ……………… applications
Internal Threats
Maintenance, Obsolete, Legacy, Modern
Fill The Blank:
If software has become legacy software, it may be chosen to replace it with an up-to-date …………….. which will impact the business; how will ………. be stored during the transfer?
Internal Threats
Version, Data
Fill The Blank:
Hardware can become outdated because of outdated ………………… or a reduction in ……………………
Internal Threats
Firmware, Performance
Define:
Mitigate
Internal Threats
If you mitigate against something, you take steps to reduce the likelihood of it happening, or to reduce its impact if it does happen
Define:
Humidity
Internal Threats
Amount of water vapour in the air. Higher humidity means more water in the air
Define:
Firmware
Internal Threats
Code, added at time of manufacturing, written to a hardware device’s non-volatile memory - software that allows hardware to run
Fill The Blank:
How a digital system and ……….. are used could lead to a …………..
Internal Threats
Data, Threat
Fill The Blank:
Using business devices on unsecured …………. can leave employees vulnerable to attacks
Internal Threats
Hotspots
Fill The Blank:
Some risk is mitigated through an …….. (if employees follow it) but there is the risk that a ……………………… employee could pose a threat to the hardware and software of the digital system.
Internal Threats
AUP, Disgruntled
Expain:
2 natural disasters and briefly how they could impact digital systems
External Threats
- Earthquake could stop internet
- Floods or tsunamis could destroy and wash away buildings
- Lightning strikes cause surge or spike in electricity supply
State:
2 potential impacts of a natural disaster on digital systems
- Any natural disaster could destroy backups
- Power failure as potential after affects limiting access to data
This is not an extensive list