Targetted attacks are where a threat actor focuses attacks at a specific entity. THis often requires a lot of research and planning
Confidentiality concerns the handling and protection of sensitive information
The main risks of failing to maintain confidentiality and privacy are?
Legal
Financial loss
Data loss
Productivity loss
Reputational loss
The 3 main forms of mitm are?
Spoofing
Eavesdropping
Hijacking
What are the 5 physical vulnerabilities?
Location
System design
Circumstances of use
Usercharacteristics
Systemrobustness
Confidentiality is keeping data from being accessed without authorisation
Integrity refers to the assurance of data, to be trustworthy and is accurate
Integrity measures are things like checksums, verification, and signatures
Availability measures are systemprotection measures
Confidentiality measures are keeping data private such as encryption, and strictauthorisation
Risk Management ends with either accepting, avoiding, or mitigating risk
User characteristics are a physical vulnerability as they can introduce threats to a system by subvertingsystem protections such as downloading from a suspicioussource
Location is a physical vulnerability as it may be easier to tamper with, and also its environment may be prone to natural disasters
System robustness is a vulnerability of a system regarding it's ability to handleunexpected circumstances
CIrcumstances of use is also a vulnerability such as being in public allowing for shoulder surfing, or connecting to a public wifi
System design is a physical vulnerability, as if it is too complicated then vulnerabilities of a system may be missed. If it is too simple it may lack security features