Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security vulnerabilities and controls - Coggle Diagram
Security vulnerabilities and controls
Data breaches
When personal information is accessed, disclosed without authorization, or is lost.
:consequences (has to be relevant to the case study)
Company collapse
Loss of reputation with customers
Unauthorized access to customer accounts
Breaches of Privacy Law (fines)
Emails used for phishing scams
man-in-the-middle attacks
- An attacker ‘spoofs’ an unsecured wifi network that a client connects too
solution:
ensure website is using https (TLS)
VPN (gotta trust if the VPN is trustworthy)
social engineering
replying on the manipulation of human nature to persuade the victim to provice personal information or to initiate a transcation.
eg. tricking the victim into clicking 'accept' with admin permissions or into giving the attack physical access to a device.
version control
- are a category of software tools that help a software team manage changes to source code over time.
Developers upload the updates and changes they make to the source code of applications
user authentication
- To confirm a user is allowed to access a resource
encryption
- Encoding information so that is unreadable without the use of the encryption key
software updates
-
Improve security
Fix errors (crashing, poor performance)
Add new functionality
Improve usability / performance