Please enable JavaScript.
Coggle requires JavaScript to display documents.
Threats To Information Security - Coggle Diagram
Threats To Information Security
1. Compromises to Intellectual Property
The ownership of ideas and control over the tangible or virtual representation of those ideas.
E.g. Trade secrets, Copyrights, Trademarks, Patents
Software Piracy
- unlawful use of duplication of software-based IP. Enforced through digital watermarks and embedded codes
Intellectual Property Office of Singapore (IPOS) has Copyright Registry and other initiatives helping protect work
SPF and Commercial Affairs Department (CAD) investigate and handle cases of software abuse and cybercrime
2. Deviations in Quality of Service
Organisation's IS depends on successful operation of many interdependent support systems
Internet Service Issues
Loss of internet service can cause considerable loss in availability of info
Internet service provider failures worsen information availability as orgs have staff working at remote locations
When an organization places its Web servers in the care of a Web hosting provider, that outsourcer assumes responsibility for all Internet services as well as for the hardware and operating system software used to operate the Web site
Comms & other service provider issues
Utility services e.g. water, telephone, etc
Can lead to inability of org to function
Power Irregularities
Fluctuations like power excesses, power shortages, power losses
Voltage levels can:
Spike
- momentary increase/surge; prolonged increase
Sag
- momentary low voltage or brownout; prolonged drop
Fault
- momentary loss of power or blackout; prolonged loss
Controls e.g. install surge protectors, voltage regulators, uninterrupted power supply, can manage power quality
3. Espionage or Trespass
Access of protected information by unauthorised individuals, enable info gatherers to enter premises or systems they have no authority to enter
Unskilled Hacker
Used expertly written software to exploit systems
aka Script Kiddies / Packet Monkeys
Cracker
"cracks" or removes software protected designed to prevent unauthorsed duplication
Expert Hackers
Write software that automates system exploitation
Phreaker
Hacks public telephone system to make free calls or disrupt services
4. Force of Nature
Most dangerous as unexpected and occur with very little warning e.g. fires, floods, earthquakes etc.
Disrupt information storage, transmission, usage
Management must implement controls to limit damage + prepare contingency plans for continued operations
5. Human Error or Failure
Acts performed without intent or malicious purpose by individual who is an org's employee
3 Causes
Inexperience
: new employee not well-versed / trained in org's data handling procedures
Improper Training
: Employees have not received proper training on effective usage of new cybersecurity tools
Incorrect Assumptions
: Employees wrongly assume the org's security measures will protect them from cyber threats, leads to breach
Lead to
Accidental data deletion or modification
Data storage in unprotected areas
Entry of erroneous data
Failure to protect information
Revelation of classified data
Social Engineering
Social skills to convince people to reveal access credentials or valuable info to attackers
Timing Attack
: Collect info to password-protected sites by exploring contents of web browser's cache or attempt to intercept cryptographic elements to determine keys to encryption algorithms
Business e-mail Compromise
: exploits systems & users by crafting one with specific details to look legitimate and appear urgent
Advance-fee Fraud
: Indicates recipient is due money and small advance fee / personal banking info required to facilitate transfer
Phishing
: Gain personal / confidential info; apparent legitimate communication hides embedded code that redirects user to third-party site
6. Information Extortion / Cyberextortion
Attacker or formerly trusted insider stealing info from computer system and demanding compensation for its return or agreement not to disclose the info e.g. credit card number theft
Ransomware
: Malware attack on the host system that denies access to the user and offer to provide a key to allow access back to user's system and data for free, due to phishing or spear-phishing attacks
Lockscreen Ransomware
: locks victim out of device, displays a full-screen message / webpage demanding a ransom to unlock it e.g. FBI Ransomware / Police-themed Ransomware
Encryption Ransomware
: encrypts victim's files or hard drive, makes them inaccessible until a ransom is paid e.g. WannaCry
Pop-ups indicating illegal information or malware was detected on system / offering to delete offending material if user clicks link or button
7. Sabotage or Vandalism
Deliberate sabotage of computer system or business, acts of vandalism to destroy assets or image of organisation
Web site defacing
: erode consumer confidence, diminish organisation's sales, net worth and reputation
Hacktivist or Cyberactivist
Individual or group using digital technologies like internet, social media to advocate for social, political, environmental or human rights causes
Hack into target's online resource like e-mail or social media and release that info to public
Cyberterrorism / Cyberwarefare
: aimed at disrupting gov agencies, create mass havoc with civilian and commercial industry targets
8. Software Attacks
Part of campaign that intergrates
Tools, Techniques, Procedures
to merge specially crafter software + social engineering methods to trick users to install computer code
Malware
Virus: consists of code segments (programing instructions) that perform malicious actions
Worms: can continue replicating itself till it completely fills available resources e.g. memory, hard drive space, network bandwidth
Trojan Horses: frequently disguised as helpful, interesting, necessary piece of software e.g. readme.exe files included with shareware or freeware packages
Polymorphic Threats: evolves, changes its size and other external file characteristics to elude detection by antivirus software programs
Virus & Worm Hoaxes: more time and money spent resolving virus hoaxes
Back Doors
Gain access to system or network resource through known or newly discovered access mechanism. Can be installed with viruses and worms that have payload (perform specific action)
Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS)
DoS: attacker send large number of connection or info requests, target system becomes overloaded and cannot respond to legitimate requests for service. System may crash or be unable to perform ordinary functions
DDoS: coordinated stream of requests is launched against target from many locations at same time
E-mail Attacks
Unwanted e-mail e.g. bulk commercial email / spam, users click on attachments through inattention or clickbaiting
Waste of computer and human resources
Comms Interception Attacks
Packet Sniffer: monitor data travelling over networks, can be used for legitimate network management functions or stealing info
Spoofing: obtain trusted IP addresses and modify packet headers to insert forged addresses
Pharming: use Trojans, worms etc to attack internet browser's address bar so valid URL typed is modified to be of illegitimate website
Man-In-The-Middle: attacker monitors / sniffs packets from the network, modifies them and inserts back into network
Zero-day Attack: when an attack makes use of malware that is not yet known by antimalware software companies
9. Technical Hardware Failures or Errors
When manufactuere distributes eqm with known or unknown flaw, causes system to perform outside expected parameters resulting in unreliable service or lack of availabillity
Terminal Errors: unrecoverable loss of eqm. Some are intermittent and only manifest themselves periodically, cause faults that are not easily repeated
Mean Time Between Failures (MBTF)
Presumes item can be repaired or returned to service
Mean Time To Failure (MTTF)
Presumes item must be replaced