Threats Actors Flashcards
Anything that could cause harm, loss, damage, or compromise to our information
technology systems
Can come from the following:
● Natural disasters
● Cyber-attacks
● Data integrity breaches
● Disclosure of confidential information
Threat
Any weakness in the system design or implementation
Come from internal factors like the following:
● Software bugs
● Misconfigured software
● Improperly protected network devices
● Missing security patches
● Lack of physical security
Vulnerability
Confidentiality is important for 3 main reasons…
To protect personal privacy
To maintain a business advantage
To achieve regulatory compliance
Confidentiality, uses 5 basic methods
Encryption
Access Controls
Data Masking (obscuring specific data within database)
Physical Security Measures
Training and Awareness
Integrity is important for three main reasons
To ensure data accuracy
To maintain trust
To ensure system operability
Integrity, uses 5 basic methods
Hashing
Digital Signatures
Checksums
Access Controls
Regular Audits
Availability helps with the following…
Ensuring Business Continuity
Maintaining Customer Trust
Upholding an Organization’s Reputation
Redundancy
Duplication of critical components or functions of a system with the intention of enhancing its reliability
Types of Redundancy
Server Redundancy
Data Redundancy (Involves storing data in multiple places)
Network Redundancy (Ensures if one network path fails, data can travel another)
Power Redundancy (involves using backup power sources)
An Individual or entity repsonsible for incidents that impact security and data protection
Threat Actor
■ Data Exfiltration
■ Blackmail
■ Espionage
■ Service Disruption
■ Financial Gain,
■ Philosophical/Political Beliefs
■ Ethical Reasons
■ Revenge
■ Disruption/Chaos
■ War
Threat Actor Motivations
■ Internal vs. External Threat Actors
■ Differences in resources and funding
■ Level of sophistication
Threat Actor Attributes
Limited technical expertise, use readily available tools
Unskilled Attackers
Unskilled Attackers
Hacktivists
Organized Crime
Nation-State Actor
Insider Threats
Types of Threat Actors
Driven by political, social, or environmental ideologies
Hacktivists
Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
Organized Crime