Week 1B - Threats, Vulnerabilities, Incidents & Attacks Flashcards
Threat
A set of circumstances with the potential to cause harm assets by compromising security goals
Vulnerabilities
Characteristics of, or weaknesses in a system that could be used to cause harm if acted on by a threat
What is a security incident?
When a threat and vulnerability coincide, resulting in harm to the information asset
What is an attack?
An attack is a security incident where vulnerabilities are deliberately/intentionally exploited
What are the 3 Information States?
- In Storage
- In Transmission
- Being Processed (In Use)
What is a control?
Used to protect information assets or business goals by countering threats or reducing vulnerabilities
What are the 3 types of security controls?
Preventative, Detective, Corrective
Preventative Controls
Aim to prevent or reduce the likelihood of an incident occuring
Detective Controls
Monitoring to identify attempts or successful exploited vulnerabilities
Corrective Controls
Aim to recover from harm to information assets and or business goals