Assets, Vulnerabilities, Threats and Attacks Flashcards
What is an Asset?
In the context of cybersecurity, an asset refers to any resource that holds value to an organisation and therefore needs protection.
There are two types of Assets; tangible or intangible and can include anything that is critical to the organisation’s operations, reputation, or security. Protecting these assets is a primary goal of cybersecurity.
In cybersecurity, the goal is to protect these assets from threats such as unauthorised access, theft, damage, or disruption. Effective asset management involves identifying and prioritising assets, assessing the risks they face, and implementing measures to mitigate those risks.
What is a Critical Asset?
A critical asset in the context of cybersecurity is an asset that is essential to the functioning, security, and success of an organisation. The loss, compromise, or disruption of a critical asset would have a significant negative impact on the organisation’s operations, reputation, financial stability, or compliance with legal and regulatory requirements.
Critical assets are often prioritised for protection because of their importance to the overall mission and objectives of the organisation.
Identifying and protecting critical assets is a key component of a robust cybersecurity strategy. Organisations often conduct risk assessments to identify which assets are critical and then implement measures to ensure their security and availability. This might include enhanced monitoring, access controls, encryption, disaster recovery plans, and other protective measures.
What is a Tangible Asset?
In the context of cybersecurity, a tangible asset refers to physical hardware or infrastructure that is critical to the security and operation of an organisation’s digital environment. These assets are the physical components that support the IT infrastructure, enabling the storage, processing, and transmission of data, and they require protection both from cyber threats and physical threats.
Examples of tangible assets in cybersecurity include:
- Servers: Physical machines that host critical applications, databases, and services. They are central to the organisation’s operations, and their security is crucial to prevent unauthorised access or data breaches.
- Networking Equipment: Routers, switches, firewalls, and other hardware that control and manage the flow of data within and between networks. Securing these devices is vital to protect against attacks such as man-in-the-middle (MITM) attacks or network intrusions.
- Data Storage Devices: Physical devices like hard drives, solid-state drives (SSDs), and storage arrays that hold sensitive data. Protecting these from theft, tampering, or destruction is essential to prevent data loss or breaches.
- Workstations and End-User Devices: Computers, laptops, smartphones, and other devices used by employees to access the network. These devices must be secured to prevent malware infections, unauthorised access, and data leaks.
- Security Appliances: Dedicated hardware devices such as intrusion detection systems (IDS), intrusion prevention systems (IPS), and hardware security modules (HSMs) that provide specialised security functions. These appliances must be protected from physical tampering or attacks.
- Backup and Recovery Systems: Physical systems used to back up data and ensure business continuity, such as tape drives or dedicated backup servers. Ensuring the physical security of these systems is key to maintaining reliable recovery options in the event of a cyber incident.
- Software required for the delivery of a service: despite being unable to physically touch it, service delivery software is considered a tangible asset.
In cybersecurity, tangible assets must be protected not only through traditional physical security measures (like locks, surveillance, and access controls) but also through cybersecurity measures that prevent unauthorised access, tampering, or other forms of compromise that could impact the organisation’s digital infrastructure.
What is an Intangible Asset?
An intangible asset in the context of cybersecurity refers to a non-physical asset that holds value to an organisation and is crucial to its operations, reputation, or competitive advantage. Unlike tangible assets, intangible assets cannot be touched or measured physically, but they play a vital role in the success and sustainability of a business.
Examples of intangible assets in cybersecurity include:
- Intellectual Property (IP): This includes patents, trademarks, copyrights, trade secrets, and proprietary software or algorithms. Protecting IP is critical to maintaining a competitive edge and ensuring that the organisation’s innovations are not stolen or copied.
- Data: While data can be stored on physical media, the information itself is intangible. This includes customer data, financial records, research data, and other critical information that is essential to the organisation’s operations. Ensuring the confidentiality, integrity, and availability of data is a core objective in cybersecurity.
- Brand Reputation: An organisation’s reputation and the trust it has built with customers, partners, and the public are intangible but extremely valuable. A security breach can severely damage an organisation’s reputation, making its protection a priority.
- Goodwill: The value of the organisation’s relationships with customers, employees, and suppliers. Goodwill represents the reputation and customer loyalty that have been built over time. It can be significantly impacted by a cybersecurity incident.
- Software Licences and Digital Rights: These include the rights to use specific software, databases, or digital content. Protecting these licences from theft or misuse is essential to maintaining legal and operational integrity.
- Business Processes: Proprietary business methods, models, and operational procedures that provide a competitive advantage. These processes may be documented digitally, making them susceptible to cyber threats.
- Customer Lists and Contracts: Confidential agreements, contracts, and client information that are critical for business operations. The loss or theft of such data could lead to competitive disadvantages or legal liabilities.
In cybersecurity, protecting intangible assets involves implementing measures to safeguard data integrity, prevent unauthorised access, and ensure compliance with legal and regulatory requirements. Intangible assets are often more challenging to protect than tangible ones because they can be easily transferred, copied, or altered, making robust cybersecurity practices essential.
What is a Vulnerability?
A vulnerability in the context of cybersecurity is a weakness or flaw in a system, software, hardware, or process that can be exploited by a threat actor to gain unauthorized access, cause disruption, or damage the system. Vulnerabilities can arise from various sources, such as design flaws, implementation errors, misconfigurations, or lack of proper security controls.
Vulnerabilities are commonly divided into either technological vulnerabilities or organisational vulnerabilities.
What is a Technological Vulnerability?
A technological vulnerability refers to weaknesses in the design, implementation, or configuration of technical components like hardware or software.
What is an Organisational Vulnerability?
An organisational vulnerability involves weaknesses related to people, processes, and procedures.
What is the Window of Vulnerability?
The window of vulnerability refers to the period during which a system, application, or network is exposed to potential threats due to an existing vulnerability. This timeframe begins when the vulnerability is first introduced or discovered and ends when it is effectively mitigated, usually through a patch, update, or other corrective measures.
During the window of vulnerability, the system is at increased risk because attackers may exploit the weakness before it is addressed.
What are Common Vulnerabilities and Exposures (CVEs)?
Hosted by the MITRE corporation, CVEs (Common Vulnerabilities and Exposures) are publicly disclosed cybersecurity vulnerabilities and exposures. The CVE system provides a reference method for publicly known information-security vulnerabilities and exposures. Each CVE is assigned a unique identifier, such as “CVE-2024-1234,” which allows security professionals and organisations to quickly and accurately share information about specific vulnerabilities.
What is a Threat?
Anything that is capable of acting in a manner that results in harm to an asset and/or organisation; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures.
(The Open Group, 2009, p. 3)
Threats will usually fall under one of two categories; human or non-human threats (like geological events).
Human threats can be further subdivided into either unintentional/accidental or intentional/malicious.
What is an Attack?
An attack is the realisation of a threat that takes advantage of one or more vulnerabilities in order to negatively impact an organisation’s assets.
Attacks can be categorised as passive, active, targeted or non-targeted.
What is a Passive Attack?
An attempt to learn, understand or make use of information without directly impacting the state of a system resource (Stallings and Brown, 2012).
What is an Active Attack?
An attempt to alter a system, such as by stealing or destroying data, or to disrupt its operation, such as through a denial-of-service attack.
What is an Attack Vector?
An attack vector is the method or pathway that a threat actor uses to gain unauthorised access to a system, network, or application in order to carry out malicious activities. It represents the route or technique that an attacker exploits to deliver a threat and compromise the security of a target.
Attack vectors can take many forms, including:
- Phishing: Sending fraudulent emails or messages to trick individuals into revealing sensitive information, such as login credentials or financial details.
- Malware: Infecting systems with malicious software, such as viruses, worms, trojans, or ransomware, to steal data, disrupt operations, or gain control of systems.
- Exploiting Vulnerabilities: Taking advantage of weaknesses in software, hardware, or configurations to gain unauthorized access or escalate privileges within a system.
- Social Engineering: Manipulating people into divulging confidential information or performing actions that compromise security, often bypassing technological safeguards.
- Brute Force Attacks: Repeatedly trying different combinations of passwords or encryption keys to gain access to a system.
- Man-in-the-Middle (MITM) Attacks: Intercepting and potentially altering communications between two parties without their knowledge.
- SQL Injection: Inserting malicious code into a database query via an insecure input field to manipulate the database and access or modify data.
- Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks: Overwhelming a system or network with excessive traffic to render it unusable or disrupt its normal operations.
Understanding attack vectors is crucial for organisations as it helps in identifying potential entry points for attacks and implementing appropriate security measures to defend against them.
What is the Attack Surface?
The attack surface refers to the total sum of all possible entry points (attack vectors) through which an unauthorised user or malicious actor could try to gain access to a system, network, or application. It encompasses all the exposed areas where an attacker could potentially exploit vulnerabilities, including hardware, software, networks, and even human factors.
The attack surface is sometimes divided into three separate surfaces:
• Digital attack surface: attacks made possible through technological vulnerabilities; for example, those in operating systems, applications and network connections
• Physical attack surface: attacks made possible because attackers are in the same location as the target; for example, attacking through physical access to servers, laptops, mobile phones, printers and so on
• Social engineering attack surface: attacks made possible by exploiting human behaviours;