2.1 Common Threats Flashcards
(33 cards)
2.1.1 Threat Domains
A threat domain is considered to be an area of control, authority, or protection that attackers can exploit to gain access to a system.
2.1.2 Types of Cyber Threats
Cyber threats can be classified into different categories. This allows organizations to assess the likelihood of a threat occurring and understand the monetary impact of a threat so that they can prioritize their security efforts.
Software attacks
A successful denial-of-service (DoS attack)
A computer virus
Software errors
A software bug
An application going offline
A cross-site script or illegal file server share
Sabotage
An authorized user successfully penetrating and compromising an organization’s primary database
The defacement of an organization’s website
Human errors
Inadvertent data entry errors
A firewall misconfiguration
Theft
Laptops or equipment being stolen from an unlocked room
Hardware failures
Hard drive crashes
Utility interruption
Electrical power outages
Water damage resulting from sprinkler failure
Natural disasters
Severe storms such as hurricanes or tornados
Earthquakes
Floods
Fires
2.1.3 Internal vs External Threats
Threats can originate from both within and outside of an organization, with attackers seeking access to valuable sensitive information such as personnel records, intellectual property, and financial data.
Internal threats are usually carried out by current or former employees and other contract partners who accidentally or intentionally mishandle confidential data or threaten the operations of servers or network infrastructure devices by connecting infected media or by accessing malicious emails or websites.
The source of an external threat typically stems from amateur or skilled attackers who can exploit vulnerabilities in networked devices or can use social engineering techniques, such as trickery, to gain access to an organization’s internal resources.
2.1.5 User Threats and Vulnerabilities
A user domain includes anyone with access to an organization’s information system, including employees, customers, and contract partners. Users are often considered to be the weakest link in information security systems, posing a significant threat to the confidentiality, integrity, and availability of an organization’s data.
No awareness of security
Users must be aware of and understand an organization’s sensitive data, security policies and procedures, technologies, and countermeasures that are implemented in order to protect information and information systems.
Poorly enforced security policies
All users must be aware of and understand an organization’s security policies, as well as the consequences of non-compliance.
Data Theft
Data stolen by users can pose a significant financial threat to organizations, both in terms of the resulting damage to their reputation and the legal liability associated with the disclosure of sensitive information.
Unauthorised downloads and media
Many network and device infections and attacks can be traced back to users who have downloaded unauthorized emails, photos, music, games, apps, or videos to their computers, networks, or storage devices. The use of unauthorized media such as external hard disks and USB drives also poses a threat.
Unauthorized VPNs
VPNs can hide the theft of unauthorized information because the encryption normally used to protect confidentiality can stop a network administrator from tracking data transmission (unless they have permission to do so).
Unauthorized websites
Accessing unauthorized websites can pose a risk to a user’s data and devices, as well as the organization itself. Often, these websites prompt users to download scripts or plugins that contain malicious code or adware. Some of these sites can even take over user devices like cameras and applications.
Destructions of systems, applications and data
The accidental or deliberate destruction or sabotage of systems, applications, and data poses a serious risk to all organizations. Activists, disgruntled employees, or industry competitors may attempt to delete data and destroy or misconfigure devices to make organizational data and information systems unavailable.
Always keep in mind that there are no technical solutions, controls, or countermeasures that will make information systems any more secure than the behaviors and processes of the people who use these systems.
2.1.6 Threats to Devices
Any devices left powered on and unattended pose the risk of someone gaining unauthorized access to network resources.
Downloading files, photos, music, or videos from unreliable sources could lead to the execution of malicious code on devices.
Cybercriminals often exploit security vulnerabilities within software installed on an organization’s devices to launch an attack.
An organization’s information security teams must try to keep up to date with the daily discovery of new viruses, worms, and other malware that pose a threat to their devices.
Users who insert unauthorized USB drives, CDs, or DVDs run the risk of introducing malware, or compromising data stored on their device.
Policies are in place to protect an organization’s IT infrastructure. A user can face serious consequences for purposefully violating such policies.
Using outdated hardware or software makes an organization’s systems and data more vulnerable to attack.
2.1.7 Threats to the Local Area Network
The local area network (LAN) is a collection of devices, typically in the same geographic area, connected by cables (wired) or airwaves (wireless).
Because users can access an organization’s systems, applications, and data from the LAN domain, it is critical that it has strong security and stringent access controls.
Examples of threats to the LAN include:
Unauthorized access to wiring closets, data centers and computer rooms
Unauthorized access to systems, applications and data
Network operating system or software vulnerabilities and updates
Rogue users gaining unauthorized access to wireless networks
Exploits of data in transit
Having LAN servers with different hardware or operating systems makes managing and troubleshooting them more difficult
Unauthorized network probing and port scanning
Misconfigured firewalls
2.1.8 Threats to the Private Cloud
The private cloud domain includes any private servers, resources, and IT infrastructure available to members of a single organization via the internet. While many organizations feel that their data is safer in a private cloud, this domain still poses significant security threats, including:
Unauthorized network probing and port scanning
Unauthorized access to resources
Router, firewall or network device operating system or software vulnerabilities
Router, firewall or network device configuration errors
Remote users accessing an organization’s infrastructure and downloading sensitive data
2.1.9 Threats to the Public Cloud
Where a private cloud domain hosts computing resources for a single organization, the public cloud domain is the entirety of computing services hosted by a cloud service or internet provider that are available to the public or shared across organizations.