8.1.4 Potential physical vulnerabilities to systems, data and information Flashcards
Fill The Blank:
Some companys run vulnerability testing (aka …………………… testing) when the digital system is being created and ………………
Vulnerability, Penetration, Installed
Fill The Blank:
………………….. testing when the computer system is running to identify …………………. and steps can be taken to close them before an attack is successful
Vulnerability, Vulnerability
Fill The Blank:
The biggest threat to digital systems is the ………… so they must be made aware of the vulnerabilities so that they do not become the start of any issues
User
State:
The 2 categories that physical threats can be split into
- Internal
- External
Explain:
Two factors affecting the location of physical systems and how these could be mitigated against
Internal Threats
- Area with limited flammable material to limit fire risk (fire alarm system should be installed)
- Low humidity/ventilation because heat can become humidity and components can corrode or be damaged to the point of not working as intended - Climate controlled area to regulate humidity and temperature
Fill The Blanks:
The ………….. of digital systems should also be considered as this can also be a ……………………..
Internal Threats
Layout, Vulnerability
State:
3 examples of physical threats to a system that link to the layout
Internal Threats
3 of:
* Door access codes not being updated regularly
* Using simple access codes such as 1234
* Reusing access codes on a rotation basis
* Lack of monitoring of access to secure areas
* Unnecessary access to secure areas
Fill The Blank:
When a digital system is installed it can be assumed the hardware and software will be up to date and can be classed as ……………..
Internal Threats
Robust
Fill The Blank:
Over a systems lifetime …………….. must be carried out. Eventually software will be become …………….. or (possibly earlier on) be classed as ……………….. software because there is limited support for interaction with ……………… applications
Internal Threats
Maintenance, Obsolete, Legacy, Modern
Fill The Blank:
If software has become legacy software, it may be chosen to replace it with an up-to-date …………….. which will impact the business; how will ………. be stored during the transfer?
Internal Threats
Version, Data
Fill The Blank:
Hardware can become outdated because of outdated ………………… or a reduction in ……………………
Internal Threats
Firmware, Performance
Define:
Mitigate
Internal Threats
If you mitigate against something, you take steps to reduce the likelihood of it happening, or to reduce its impact if it does happen
Define:
Humidity
Internal Threats
Amount of water vapour in the air. Higher humidity means more water in the air
Define:
Firmware
Internal Threats
Code, added at time of manufacturing, written to a hardware device’s non-volatile memory - software that allows hardware to run
Fill The Blank:
How a digital system and ……….. are used could lead to a …………..
Internal Threats
Data, Threat