quartz/content/notes/03-threats-social-engineering-and-failures.md
2022-07-24 13:18:15 +12:00

2.6 KiB

title aliases tags
03-threats-social-engineering-and-failures
comp210

News

  • kiwis urged to get new passwords by government cybersecurity agency (big password energy)
  • ukraine cyber agency reports cyber attack surge
  • plymouth households hit by clarion housing cyber attack
  • facebook "unintentionally uploaded" 1.5 million peoles email contacts without their consent
  • threat maps: https://threatmap.checkpoint.com/ThreatPortal/livemap.html

Threats

events are circumstances that has the potential (risk) to adversely affect assets (reducing their value)

  • e.g., possibility of text messages stop working -> phone loses value

Attack

intentional or unintentional (e.g., lightning) acts that can damage or compromise assets.

  • the actual act of attacking
  • can be passive attack: e.g., stumble accross information accidentaly

Exploits

  • the techniques used

Vulnerabilities

  • the potential weaknesses in assets or in their defensive control systems
  • e.g., try to find weakpoints in a castle

Arms race

security is a never ending arms race. Security is improving but so are the number of potential exploits

12 groups of threats

Intellectual property

  • creation ownership and control of original ideas
  • common breaches include software priracy
  • two organisatons investigate software abuse
    • software and information industry association (SIIA)
    • business software alliance (BSA)
  • enforcement of copyright laws has been attempted with technical security mechanisms (e.g., watermark, you need an account, must register the software, etc)

deviations in quality of service

  • when a product is not delivered as expected
  • info systems depend of successful operation of many interdependent support systems
  • internet, communications, power irregularities, all affect the availability of information systems
  • internet:
    • ISP failures can considerably undermine the availability of information
    • outsourced web hosting assumes responsibility for all internet service as well as for the hardware and the web site operaing system software.
    • terms of service ensure that these services are guaranteed
  • communication and other provider service issues include
    • other untilities: telephone, water, wastewater, garbage collection
    • these all affect the companies ability to function
  • power irregularities
    • pwer exess, shortages, losses
    • sensitive equipment vulnerable to and easily damaged by fluctuations
    • controls can be applied to manage power quality e.g., UPS

espionage or trespass

  • unauthorized attempts to gain illegal access to information