Fundamentals Flashcards
Information Security
Protects the data
Information Systems Security
Protects the devices that holds and process the data
Threat
Anything that could cause harm, loss, damage, or compromise to information technology systems.
Threats incidents
- Natural disasters
- Cyber-attacks
- Data integrity breaches
- Disclosure of confidential information
Vulnerabilities examples
- Software bugs
- Misconfigured software
- Improperly protected network devices
- Missing security patches
- Lack of physical security
Vulnerability
Any weakness in the system design or implementation.
Threat x Vulnerability
- Threats are originated from external sources and cannot be controlled.
- Vulnerabilities can be controlled by mitigating, transferring, avoiding or accepting the risk.
Intersection of threats and vulnerabilities is where the risk to enterprise systems and networks lies
Threat + No Vulnerability = Is there any risk?
No Risk
Vulnerability + No Threat = Is there any risk?
No Risk
Vulnerability + Threat = Is there any risk?
Yes! There are some risk envolved.
Think about daily analogies for Threats and Vulnerabilites.
While going from home to job…
You car can break in the middle of way = lack of maintenance [VULNERABILITY]
Another driver can cause an accident = Another driver dangerous driving [THREAT]