From dddbf5fe0b871d02f300da62f627aa3de4150947 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Sun, 24 Jul 2022 13:18:15 +1200 Subject: [PATCH] vault backup: 2022-07-24 13:18:15 --- ...threats-social-engineering-and-failures.md | 27 ++++++++++++++++--- 1 file changed, 24 insertions(+), 3 deletions(-) diff --git a/content/notes/03-threats-social-engineering-and-failures.md b/content/notes/03-threats-social-engineering-and-failures.md index cdd3b6ba0..d5ac5f96d 100644 --- a/content/notes/03-threats-social-engineering-and-failures.md +++ b/content/notes/03-threats-social-engineering-and-failures.md @@ -36,6 +36,27 @@ security is a never ending arms race. Security is improving but so are the numbe ## Intellectual property - creation ownership and control of original ideas -- common breaches - - software priracy - - \ No newline at end of file +- common breaches include software priracy +- two organisatons investigate software abuse + - software and information industry association (SIIA) + - business software alliance (BSA) +- enforcement of copyright laws has been attempted with technical security mechanisms (e.g., watermark, you need an account, must register the software, etc) + +## deviations in quality of service +- when a product is not delivered as expected +- info systems depend of successful operation of many interdependent support systems +- internet, communications, power irregularities, all affect the availability of information systems +- internet: + - ISP failures can considerably undermine the availability of information + - outsourced web hosting assumes responsibility for all internet service as well as for the hardware and the web site operaing system software. + - terms of service ensure that these services are guaranteed +- communication and other provider service issues include + - other untilities: telephone, water, wastewater, garbage collection + - these all affect the companies ability to function +- power irregularities + - pwer exess, shortages, losses + - sensitive equipment vulnerable to and easily damaged by fluctuations + - controls can be applied to manage power quality e.g., UPS + +## espionage or trespass +- unauthorized attempts to gain illegal access to information