Basic Cybersecurity Terms
System Resources
- System Resource or asset that needs to be protected
Assets types needed to protect.
- Hardware - Computer System, data storage, communication devices.
- Software - Operating systems, program utilities and applications.
- Data - Data and password files, databases.
- Communication facilities and networks - LAN, WAN, routers, etc.
Vulnerabilities of system resources
- A flaw or weaknesses in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy.
What in CIA is violated:
- When the resource is corrupted ➡️ violate Integrity
- When the resource is leaky ➡️ violate Confidentiality
- When the resource is unavailable ➡️ violate Availability
Threat
- Possible danger that might exploit a vulnerability.
- It represents a potential harm to the system resource.
Attack
- A threat that is carried out (threat action)
- Two attack types:
- Active attack: An act that has negative effects on system resources
- Passive attack: An act to make use of system information but it does not affect the system
- The origin of an attack:
- Inside attack : Carried out by an entity inside the security perimeter.
- Outside attack : Performed by an unauthorized users.
Adversary
- An entity that carried out an attack
- A threat agent or an attacker.
Countermeasure
- Any means taken
- To address an attack,
- To prevent an attack from being successful,
- To detect the attack if the attack is successful, and
- To recover from the damage due to the attack.
Risk
- The expected loss due to a particular attack.
Comments
Post a Comment