Week 2- assets, vulnerabilities, threats and attacks. Flashcards
What are assets?
things we own that are of value.
What is a critical asset?
an asset that without a person or organisation cannot function.
how many types of assets are there?
2, tangible - something you can touch, see or experience. Software is considered tangible.
intangible - information, intellectual property, personal, corporative or professional reputation.
what are vulnerabilities?
weaknesses in an asset that allow hostile actors to gain unauthorised access.
What are the types of vulnerabilities?
Technological vulnerabilities - weak design, implementation and configuration of tech components. Example, internet facing ports left open.
organisational vulnerabilities - related to people processes and procedures.
Explain the window of vulnerability
vulnerabilities in themselves are not a problem but cause a potential threat. The time between attackers discovering the vulnerability and applying fixes becomes a race between attacker and the time vulnerabilities are eliminated. Thus the window of vulnerability.
What is Common Vulnerabilities and Exposure (CVE)?
A database hosted by MITRE corp which contains identifiers for publicly disclosed vulnerabilities. Each vulnerability has its own unique identifier
Who is MITRE?
founded in 1958 to support the US air forces SAGE project that pioneered everyday computers and networking tech. MITRE manages civil and government projects.
what are threats?
a potential cause of damage to an asset utilising vulnerabilities.
what are attacks?
any form of unauthorised access affecting the confidentiality, integrity or availability (CIA) of an asset.
Passive, active, targeted or untargeted attacks, what are they?
a passive attack is an attempt to learn, understand or make use of information without directly impacting the state of a system resource.
an active attack is an attempt to make changes to a system by stealing or destroying data ot by impacting operations such as DoS attack.
a targeted attack is when an attacker aims at a specific organisation as they have interests.
an untargeted attack is indiscriminate.
What are attack vectors?
a way for an attacker to enter a network or system
What is Phishing?
emails and personal message sent with the intention of eliciting personal information that can be used to gain access to a system.
What is Ransomware?
malicious software that encrypts data and demands a ransom before access is restored (WannaCry is an example)
What are Third-party vendors and business partners?
when a organisation outsources part of their system to other organisation exposing themselves to risk because of the other organisation cyber security policies (Target hack)