Threats to Information System
Anything which has the potential to cause harm to the information system is called a Threat. Threats exploit the vulnerability of the information systems by breaching the security and provide a clear idea of how to make a system more secure and efficient. In other words, we can say that a threat is anything that can disrupt the operation, functioning, integrity, or availability of a network or system.

Vulnerabilities
Vulnerability is an inherent weakness in the design, configuration, or implementation of a network or system that renders it susceptible to a threat. Most vulnerability can usually be traced back to one of three sources:
1. Poor Design
Hardware and software systems that contain design flaws that can be exploited. In essence, the systems are created with security holes.
2. Poor Implementation
Systems that is incorrectly configured, and therefore vulnerable to attack. This type of vulnerability usually results from inexperience, insufficient training, or sloppy work.
3. Poor Management
Inadequate procedures and insufficient balances. Security measures cannot operate in a vacuum; they need to be documented and monitored. Even something as simple as the daily backup of a system needs to be verified. There also needs to be delineation of responsibility for some functions and dual custody for others.
In this manner, an organization can ensure that procedures are being followed and that no one person has total control of a system.
Identification
Identification is simply the process of identifying one’s self to another entity or determining the identity of the individual or entity with whom we are communicating.
Availability
This refers to whether the network, system, hardware, and software are reliable and can recover quickly and completely in the event of an interruption in service. Ideally, these elements should not be susceptible to denial of service attacks.
Attack
The use or exploitation of vulnerability. This term is neither malicious nor benevolent. A bad guy may attack a system, and a good guy may attack a problem.
Attacker
The person or process that initiates an attack. This can be synonymous with threat.
Exploit
The instantiation of vulnerability; something that can be used for an attack. A single vulnerability may lead to multiple exploits, but not every vulnerability may have an exploit.
Target
The person, company, or system that is directly vulnerable and impacted by the exploit. Some exploits have multiple impacts, with both primary targets and secondary targets.
Attack Vector
The path from an attacker to a target. This includes tools and techniques.
Defender
The person or process that mitigates or prevents an attack.
Compromise
The successful exploitation of a target by an attacker.
Risk
A qualitative assessment describing the likelihood of an attacker/threat using an exploit to successfully bypass a defender, attacks a vulnerability, and compromise a system.
Threats models are used for optimizing information security and the security of systems. A good threat model exploits the vulnerability of the system and the information and in this way we get a clear idea of what are the weak points of the system that are vulnerable to attacks and we can build a secure and efficient system.
Shrinkage In Concrete: Types and Methods to Reduce
Chemical Shrinkage
Autogenous Shrinkage
Plastic Shrinkage
Drying Shrinkage
Carbonation Shrinkage
Continue Reading Shrinkage In Concrete: Types and Methods to Reduce
Soil: Definition and Names of Various Types of Soil
The term ‘soil’ in soil engineering is defined as an unconsolidated material, composed of solid particles, produced by the disintegration of rocks. The void space between the particles may contain air, water or both. The soil particles may contain organic matter.
Continue Reading Soil: Definition and Names of Various Types of Soil
Bricks: Uses, Size, Weight, Frog, Types, and Much More
What are Bricks? Bricks are one of the oldest building materials and it’s extensively used at present as a loading material in construction methods because of its durability, strength, reliability, low cost, easy availability, etc. Bricks are manufactured by molding burnt clay or a mixture of sand and lime or of Portland cement concrete, in…
Continue Reading Bricks: Uses, Size, Weight, Frog, Types, and Much More
Water Proofing Materials, Damp-Proofing Course, and much more
Water Proofing Materials Dampness in a building is the main cause of the deterioration of the building as well as for the ill-health of the occupants. The damp brickwork in the buildings is prone to fresh attack. Also, the soluble salts in bricks are liable to attack the cement mortar when the brickwork remains wet…
Continue Reading Water Proofing Materials, Damp-Proofing Course, and much more
Sound Insulation And Sound Insulating Materials
Sound Insulation A well-designed building should incorporate sound insulation to restrain the noise level. High noise conditions result in uncomfortable living conditions, mental strains, fatigue, and may even lead to a nervous breakdown or temporary deafness. Adequate insulation can be achieved by using sound-absorbing or sound repellent materials. Sound Insulating Materials Sound Insulating Materials fall…
Continue Reading Sound Insulation And Sound Insulating Materials
Heat Insulating Materials: Convection, Radiation, and Conduction
Heat Insulating Materials The purpose of thermal insulation is to restrict the heat transfer from warmer to cooler areas. Transfer of heat takes place by three processes- the convection, the radiation and, the conduction. Convection In convection, heat is transferred from one place to another by the movement and mixing of liquids or gases. Radiation…
Continue Reading Heat Insulating Materials: Convection, Radiation, and Conduction
Leave a Reply