Terminology Flashcards
System Resource/Asset
Software systems, data and network systems, personnel, equipment or a logically related group of systems.
Vulnerability
Weakness in the system that can be exploited or triggered by a threat source.
- Information system, procedures, internal controls or implementation.
Leaky system through the network.
Threat
Circumstance or event what impacts adversely the operations.
Attack
Threat carried out by through a vulnerability.
- Malicious activity that tries to collect, disrupt, deny, degrades or destroys information
Adversary (threat agent)
Individual who conducts or has the intention to conduct detrimental activities
Countermeasure
Device or technique that reduces effectiveness of attacks (prevention). If it is not possible to prevent it the goal is to detect and recover form its effects.
Residual vulnerabilities may remain -> residual level of risk to assets.
Risk
Measure of the extent that an entity can be impacted by a threat, defined by level of impact or likelihood
Security Policy
Criteria for the provision of security services in order to maintain a condition of security
Active attack
Attempt to alter resources or affect operation
Passive attack
Learn or make use of information of the system, does not affect resources
Origin of the attack
Inside -> entity inside the security perimeter, authorized to access but misuses in an unapproved way
Outside -> outside the perimeter by unauth or illegitimate user.
Threats - Unauthorized disclosure
Entity gains access to data for which the entity is not authorized
To: Confidentiality
Consequence:
- Exposure: entity gains unauthorized knowledge of sensitive data
- Interception: shared LAN any device can get unauthorized access to data
- Inference: observing the pattern of traffic on a network
- Intrusion: Overcoming access control protections to get unauth data
Threats - Deception
Event where entity receives false data and will believe it to be true
To: Integrity
Consequence:
- Masquerade: posing as auth user (obtained credentials). Trojan horse appears to have a function but gains access and executes malicious logic
- Falsification: alter, replace valid data or introduce false data
- Repudiation: deny sending data or receiving/possessing data.
Threats - Disruption
Event that interrupts or prevents the correct operation and functions
To: Availability or system integrity
- Incapacitation: limit system availability. Physical or damage of hardware. Trojan horse disabling services.
- Corruption: on system integrity. Resources or services function in an unintended manner. Like a backdoor
- Obstruction: interfere communications, disabling or altering communication control information. Overload the system
Threats - Usurpation
Event that results in control of system services or functions by unauth entity
To: System integrity
- Misappropriation: theft of service. DDoS attacks, using machine resources to attack a target host.
- Misuse: disable security functions or thwarted sec functions