Basic Cybersecurity Terms

 System Resources

  • System Resource or asset that needs to be protected
Assets types needed to protect.
  • Hardware - Computer System, data storage, communication devices. 
  • Software - Operating systems, program utilities and applications. 
  • Data - Data and password files,  databases. 
  • Communication facilities and networks - LAN, WAN, routers, etc.

Vulnerabilities of system resources

  • A flaw or weaknesses in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy. 
What in CIA is violated:
  • When the resource is corrupted       ➡️ violate Integrity
  • When the resource is leaky               ➡️ violate Confidentiality
  • When the resource is unavailable    ➡️ violate Availability

Threat 

  • Possible danger that might exploit a vulnerability.
  • It represents a potential harm to the system resource. 

Attack 

  • A threat that is carried out (threat action) 
  • Two attack types:
    • Active attack:  An act that has negative effects on system resources
    • Passive attack: An act to make use of system information but it does not affect the system 
  • The origin of an attack:
    • Inside attack    : Carried out by an entity inside the security perimeter.
    • Outside attack : Performed by an unauthorized users.

Adversary 

  • An entity that carried out an attack
  • A threat agent or an attacker.

Countermeasure 

  • Any means taken 
    • To address an attack, 
    • To prevent an attack from being successful, 
    • To detect the attack if the attack is successful, and 
    • To recover from the damage due to the attack.

Risk 

  • The expected loss due to a particular attack. 







Comments

Popular posts from this blog

What is Cybersecurity?

CIA Triad

Ensuring Security in a System