Security

Cards (17)

  • The 4 human threats are?
    Malcious employees
    Social engineers
    Human error
    Targetted attacks
  • Targetted attacks are where a threat actor focuses attacks at a specific entity. THis often requires a lot of research and planning
  • Confidentiality concerns the handling and protection of sensitive information
  • The main risks of failing to maintain confidentiality and privacy are?
    Legal
    Financial loss
    Data loss
    Productivity loss
    Reputational loss
  • The 3 main forms of mitm are?
    Spoofing
    Eavesdropping
    Hijacking
  • What are the 5 physical vulnerabilities?
    Location
    System design
    Circumstances of use
    User characteristics
    System robustness
  • Confidentiality is keeping data from being accessed without authorisation
  • Integrity refers to the assurance of data, to be trustworthy and is accurate
  • Integrity measures are things like checksums, verification, and signatures
  • Availability measures are system protection measures
  • Confidentiality measures are keeping data private such as encryption, and strict authorisation
  • Risk Management ends with either accepting, avoiding, or mitigating risk
  • User characteristics are a physical vulnerability as they can introduce threats to a system by subverting system protections such as downloading from a suspicious source
  • Location is a physical vulnerability as it may be easier to tamper with, and also its environment may be prone to natural disasters
  • System robustness is a vulnerability of a system regarding it's ability to handle unexpected circumstances
  • CIrcumstances of use is also a vulnerability such as being in public allowing for shoulder surfing, or connecting to a public wifi
  • System design is a physical vulnerability, as if it is too complicated then vulnerabilities of a system may be missed. If it is too simple it may lack security features