Threats to Information System
Anything which has the potential to cause harm to the information system is called a Threat. Threats exploit the vulnerability of the information systems by breaching the security and provide a clear idea of how to make a system more secure and efficient. In other words, we can say that a threat is anything that can disrupt the operation, functioning, integrity, or availability of a network or system.
Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat. Most vulnerability can usually be traced back to one of three sources:
1. Poor Design
Hardware and software systems that contain design flaws that can be exploited. In essence, the systems are created with security holes.
2. Poor Implementation
Systems that is incorrectly configured, and therefore vulnerable to attack. This type of vulnerability usually results from inexperience, insufficient training, or sloppy work.
3. Poor Management
Inadequate procedures and insufficient balances. Security measures cannot operate in a vacuum; they need to be documented and monitored. Even something as simple as the daily backup of a system needs to be verified. There also needs to be delineation of responsibility for some functions and dual custody for others.
In this manner, an organization can ensure that procedures are being followed and that no one person has total control of a system.
Identification is simply the process of identifying one’s self to another entity or determining the identity of the individual or entity with whom we are communicating.
This refers to whether the network, system, hardware, and software are reliable and can recover quickly and completely in the event of an interruption in service. Ideally, these elements should not be susceptible to denial of service attacks.
The use or exploitation of vulnerability. This term is neither malicious nor benevolent. A bad guy may attack a system, and a good guy may attack a problem.
The person or process that initiates an attack. This can be synonymous with threat.
The instantiation of vulnerability; something that can be used for an attack. A single vulnerability may lead to multiple exploits, but not every vulnerability may have an exploit.
The person, company, or system that is directly vulnerable and impacted by the exploit. Some exploits have multiple impacts, with both primary targets and secondary targets.
The path from an attacker to a target. This includes tools and techniques.
The person or process that mitigates or prevents an attack.
The successful exploitation of a target by an attacker.
A qualitative assessment describing the likelihood of an attacker/threat using an exploit to successfully bypass a defender, attacks a vulnerability, and compromise a system.
Threats models are used for optimizing information security and the security of systems. A good threat model exploits the vulnerability of the system and the information and in this way we get a clear idea of what are the weak points of the system that are vulnerable to attacks and we can build a secure and efficient system.
You May Also Like-
What are imperfection or defects of Solids
What Do you know about Solid State?
What do you know about Solid Waste??
Processing of solid waste and On-site Handling by engineering System
What do you know about Hazardous Waste??
Landfill Disposal of Solid Waste
The term ‘soil’ in soil engineering is defined as an unconsolidated material, composed of solid particles, produced by the disintegration of rocks. The void space between the particles may contain air, water or both. The soil particles may contain organic matter.
What are Bricks? Bricks are one of the oldest building materials and it’s extensively used at present as a loading material in construction methods because of its durability, strength, reliability, low cost, easy availability, etc. Bricks are manufactured by molding burnt clay or a mixture of sand and lime or of Portland cement concrete, in…
Water Proofing Materials Dampness in a building is the main cause of the deterioration of the building as well as for the ill-health of the occupants. The damp brickwork in the buildings is prone to fresh attack. Also, the soluble salts in bricks are liable to attack the cement mortar when the brickwork remains wet…
Sound Insulation A well-designed building should incorporate sound insulation to restrain the noise level. High noise conditions result in uncomfortable living conditions, mental strains, fatigue, and may even lead to a nervous breakdown or temporary deafness. Adequate insulation can be achieved by using sound-absorbing or sound repellent materials. Sound Insulating Materials Sound Insulating Materials fall…
Heat Insulating Materials The purpose of thermal insulation is to restrict the heat transfer from warmer to cooler areas. Transfer of heat takes place by three processes- the convection, the radiation and, the conduction. Convection In convection, heat is transferred from one place to another by the movement and mixing of liquids or gases. Radiation…