隔应是什么意思| 克是什么单位| 宫腔内偏强回声是什么意思| 肾病有什么症状男性| 戴银饰变黑是什么原因| 一吃东西就牙疼是什么原因引起的| 八月十五是什么星座| 孕期同房需要注意什么| 二月二十五号是什么星座| 考试前吃什么能让大脑发挥最佳| 什么的西瓜| 红斑狼疮吃什么药最好| 犯病是什么意思| 高筋面粉和低筋面粉有什么区别| 将军是什么级别| 除外是什么意思| 为什么庙里不让孕妇去| rad是什么单位| 什么是脑死亡| 什么是基础医学| 雷贝拉唑钠肠溶片什么时候吃| 心寒是什么意思| 虔婆是什么意思| 胃烧心吃什么食物好| 流连忘返是什么生肖| 浜是什么意思| 什么情况下需要打狂犬疫苗| 左心增大是什么意思| 卖是什么意思| md是什么职位| 什么人一年只工作一天脑筋急转弯| 嘴唇起白皮是什么原因| 属羊什么命| fap什么意思| 一个金字旁一个各念什么| 薷是什么意思| 6月1是什么星座| 失而复得什么意思| 早孕三项检查什么| 力所能及什么意思| 头晕吃什么可以缓解| 手一直抖是什么原因| 超凡脱俗是什么意思| 青岛是什么省| 几年是什么年| 耳舌念什么| 低血压去药店买什么药| 偏头痛什么症状| 右肺下叶纤维灶是什么意思| 缺钠有什么症状和危害| ser是什么氨基酸| 什么叫台风| 津液亏虚吃什么中成药| 什么的太阳| 益生菌什么牌子最好| 长溃疡是缺什么维生素| 长得标致是什么意思| 裸婚什么意思| 颔是什么部位| 客源是什么意思| 人体最大的器官是什么| 随餐吃是什么意思| 97年五行属什么| 秋天什么时候| 水溶性是什么意思| 献血证有什么用| 肠炎有什么症状表现| 怀女儿有什么症状| 片状低回声区什么意思| 三里屯有什么好玩的地方| 腹胀屁多是什么原因| 隐翅虫吃什么| 铁蛋白高吃什么食物好| 鹿晗什么星座| 病毒感染发烧吃什么药| 肌肉代偿是什么意思| 天是什么结构的字| 感冒吃什么食物| 蒙脱石是什么| 猪鬃为什么是战略物资| 脚背疼挂什么科| 10月15日是什么星座| 用什么水和面烙饼最软| 土地出让和划拨有什么区别| 淋巴结肿大看什么科室最好| o是什么牌子| 结肠ca是什么意思| 侍中是什么官| 学五行属什么| 迪奥口红属于什么档次| 蓝色配什么颜色最好看| 梦到和老公吵架是什么意思| 容易放屁是什么原因| 吃饭流汗是什么原因| 手心出汗是什么原因| 神经性梅毒有什么症状| 窥视是什么意思| 大便拉不干净是什么原因| 后壁是什么意思| 第一次什么感觉| 怠工是什么意思| 为什么会厌学| 彼岸花代表什么星座| 11月9日是什么日子| mb是什么| 霉菌性阴道炎用什么洗液好| 震动棒是什么| 褒义词是什么意思| 你是什么| 吃什么能流产| 乙肝e抗体阴性是什么意思| 坐骨神经吃什么药效果最好| 男性粘液丝高什么原因| romoss是什么牌子| 言音读什么| 77代表什么意思| 想起我叫什么了吗| 猴的守护神是什么菩萨| 白莲子和红莲子有什么区别| 糖尿病适合喝什么饮料| 安康鱼长什么样| 什么是脑梗| 女人有卧蚕代表什么| 骨折用什么药恢复快| 咽喉炎吃什么水果好| 蒸馏水是什么| 多梦是什么原因造成的| 湿气到底是什么| 五十是什么之年| 聤耳是什么意思| 2月21日什么星座| 宫高是什么意思| 脸黑的人适合穿什么颜色的衣服| 脚干裂用什么药膏| 谷氨酰转肽酶偏高是什么意思| 骨质疏松吃什么药| 中性粒细胞绝对值高是什么原因| 脾胃虚寒有什么症状| 月经期同房有什么危害| 双肺间质性改变是什么意思| 三个龙读什么| 淋巴滤泡增生是什么意思严重吗| 病毒疣是什么| 什么的陪伴| 2月28号是什么星座| 拉稀拉水吃什么药管用| 儿童个子矮小看什么科| 胃炎吃什么食物好得快| 24k黄金是什么意思| 血氧低是什么原因| 谁也不知道下一秒会发生什么| 1989年是什么蛇| 驰骋沙场百战威是什么生肖| 什么地散步| 此贝是什么字| 羊蛋是什么部位| 屁股痛是什么原因| 被迫是什么意思| dido是什么牌子| 怕热出汗多是什么原因| 前胸后背出汗多是什么原因| 不领情是什么意思| 神经衰弱吃什么药好| ups是什么快递公司| 仙鹤代表什么生肖| 球蛋白低是什么原因| 胎儿没有胎心是什么原因| 宝宝拉肚子吃什么药| 促排是什么意思| 恃宠而骄什么意思| 大豆油是什么豆做的| 头是什么意思| 袁绍和袁术是什么关系| 大白条是什么鱼| 月经稀发是什么意思| 告诉我们什么道理| 心电图是什么| 塞来昔布是什么药| opo是什么| 西米露是什么材料做的| 头皮发麻什么原因| 自闭什么意思| 高压和低压差值在什么范围正常| 三八妇女节送老婆什么礼物好| 苦荞是什么植物| 什么地躺着| 追龙什么意思| 化学性肝损伤是指什么| 666什么意思| 小火龙吃什么| 什么的高楼| 痛风吃什么最好| 5月10日什么星座| 注解是什么意思| 王字旁行念什么| 肾虚什么症状| 男性尿很黄是什么原因| 冰冻三尺非一日之寒是什么意思| 蝉是什么生肖| 三十六计第一计是什么计| 太妃糖为什么叫太妃糖| 胎儿顶臀长是什么意思| 湿热吃什么中成药| 白蛋白高是什么原因| 没有子宫会有什么影响| 四月28日是什么星座| 手指上长毛是什么原因| 毫无违和感什么意思| 尘肺病吃什么能排出尘| 经变是什么意思| 96100是什么电话| 每天早上起床头晕是什么原因| 回奶吃什么药| 军校出来是什么军衔| e是什么单位| 九月初四是什么星座| 宋江是一个什么样的人| 秀才相当于现在的什么学历| 心急吃不了热豆腐什么意思| 跑步什么时候跑最好| bun什么意思| 条条框框是什么意思| 世界上最大的海是什么海| 38岁属什么| 脑委缩吃什么药能空制| comma是什么意思| 海南的海是什么海| bnp是什么| crh是什么意思| 艾滋病窗口期是什么意思| 梦见活人死了是什么意思| 低温烫伤是什么意思| 一代明君功千秋是什么生肖| 八月一日是什么节日| nt什么货币| 早上9点多是什么时辰| 什么是同源染色体| 检查乙肝五项挂什么科| 以马内利是什么意思| 窈窕淑女君子好逑是什么意思| 簇新是什么意思| 巨石强森是什么人种| 子宫内膜薄吃什么药| c12是什么| 佞臣是什么意思| 未见明显血流信号是什么意思| wpw综合症是什么意思| 做梦梦见火是什么征兆| 专项变应原筛查是什么| 晚餐吃什么菜谱大全| 耳朵痒是什么预兆| 政五行属什么| 冒菜为什么叫冒菜| 肌肉拉伤有什么症状| emo是什么意思| 关门弟子是什么意思| 明五行属什么| 小候鸟是什么意思| 什么床最环保没甲醛| 梦见捉黄鳝是什么意思| 奇花异草的异是什么意思| 塑造是什么意思| 保肝降酶药首选什么药| 无住生心是什么意思| 百度Jump to content

[天柱]县政务服务中心“零距离心服务”暖民心

From Wikipedia, the free encyclopedia
(Redirected from Threat (computer))
百度 ■本报记者左永刚在新时代背景下,提高直接融资比例,建设和完善多层次资本市场体系,新三板仍是主要战略突破点。

In computer security, a threat is a potential negative action or event enabled by a vulnerability that results in an unwanted impact to a computer system or application.

A threat can be either a negative "intentional" event (i.e. hacking: an individual cracker or a criminal organization) or an "accidental" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a natural disaster event such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event (incident is often used as a blanket term).[1] A threat actor who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. An exploit is a vulnerability that a threat actor used to cause an incident.

Standard definitions

[edit]

A more comprehensive definition, tied to an Information assurance point of view, can be found in "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" by NIST of United States of America[2]

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.

National Information Assurance Glossary defines threat as:

Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.

ENISA gives a similar definition:[3]

Any circumstance or event with the potential to adversely impact an asset [G.3] through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.

The Open Group defines threat as:[4]

Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures.

Factor analysis of information risk defines threat as:[5]

threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur.

National Information Assurance Training and Education Center gives a more articulated definition of threat:[6][7]

The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i.e., perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, <peril; asset category>, suggesting the nature of these occurrences but not the details (details are specific to events). 7. The potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to a body of knowledge).

Phenomenology

[edit]
A basic model of system threats
A basic model of system threats

The term "threat" relates to some other basic security terms as shown in the following diagram:[1]

A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the confidentiality, integrity or availability properties of resources (potentially different than the vulnerable one) of the organization and others involved parties (customers, suppliers).
The so-called CIA triad is the basis of information security.

The attack can be active when it attempts to alter system resources or affect their operation: so it compromises Integrity or Availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources: so it compromises Confidentiality.[1]

OWASP: relationship between threat agent and business impact

OWASP (see figure) depicts the same phenomenon in slightly different terms: a threat agent through an attack vector exploits a weakness (vulnerability) of the system and the related security controls causing a technical impact on an IT resource (asset) connected to a business impact.

A set of policies concerned with information security management, the Information security management systems (ISMS), has been developed to manage, according to risk management principles, the countermeasures in order to accomplish to a security strategy set up following rules and regulations applicable in a country. Countermeasures are also called security controls; when applied to the transmission of information are named security services.[8]

The overall picture represents the risk factors of the risk scenario.[9]

The widespread of computer dependencies and the consequent raising of the consequence of a successful attack, led to a new term cyberwarfare.

Nowadays the many real attacks exploit Psychology at least as much as technology. Phishing and Pretexting and other methods are called social engineering techniques.[10] The Web 2.0 applications, specifically Social network services, can be a mean to get in touch with people in charge of system administration or even system security, inducing them to reveal sensitive information.[11] One famous case is Robin Sage.[12]

The most widespread documentation on computer insecurity is about technical threats such as a computer virus, trojan and other malware, but a serious study to apply cost effective countermeasures can only be conducted following a rigorous IT risk analysis in the framework of an ISMS: a pure technical approach will let out the psychological attacks that are increasing threats.

Threats classification

[edit]

Threats can be classified according to their type and origin:[13]

  • Types of threats:
    • Physical damage: fire, water, pollution
    • Natural events: climatic, seismic, volcanic
    • Loss of essential services: electrical power, air conditioning, telecommunication
    • Compromise of information: eavesdropping, theft of media, retrieval of discarded materials
    • Technical failures: equipment, software, capacity saturation
    • Compromise of functions: error in use, abuse of rights, denial of actions

Note that a threat type can have multiple origins.

  • Deliberate: aiming at information asset
    • spying
    • illegal processing of data
  • Accidental
    • equipment failure
    • software failure
  • Environmental
    • natural event
    • loss of power supply
  • Negligence: Known but neglected factors, compromising the network safety and sustainability
[edit]

Recent trends in computer threats show an increase in ransomware attacks, supply chain attacks, and fileless malware. Ransomware attacks involve the encryption of a victim's files and a demand for payment to restore access. Supply chain attacks target the weakest links in a supply chain to gain access to high-value targets. Fileless malware attacks use techniques that allow malware to run in memory, making it difficult to detect.[14]

Common Threats

[edit]

Below are the few common emerging threats:

Threat classification

[edit]

Microsoft published a mnemonic, STRIDE,[15] from the initials of threat groups:

Microsoft previously rated the risk of security threats using five categories in a classification called DREAD: Risk assessment model. The model is considered obsolete by Microsoft. The categories were:

  • Damage – how bad would an attack be?
  • Reproducibility – how easy it is to reproduce the attack?
  • Exploitability – how much work is it to launch the attack?
  • Affected users – how many people will be impacted?
  • Discoverability – how easy it is to discover the threat?

The DREAD name comes from the initials of the five categories listed.

The spread over a network of threats can lead to dangerous situations. In military and civil fields, threat level has been defined: for example INFOCON is a threat level used by the US. Leading antivirus software vendors publish global threat level on their websites.[16][17]

Associated terms

[edit]

Threat agents or actors

[edit]

The term Threat Agent is used to indicate an individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company.[18]

Individuals within a threat population; Practically anyone and anything can, under the right circumstances, be a threat agent – the well-intentioned, but inept, computer operator who trashes a daily batch job by typing the wrong command, the regulator performing an audit, or the squirrel that chews through a data cable.[5]

Threat agents can take one or more of the following actions against an asset:[5]

  • Access – simple unauthorized access
  • Misuse – unauthorized use of assets (e.g., identity theft, setting up a porn distribution service on a compromised server, etc.)
  • Disclose – the threat agent illicitly discloses sensitive information
  • Modify – unauthorized changes to an asset
  • Deny access – includes destruction, theft of a non-data asset, etc.

Each of these actions affects different assets differently, which drives the degree and nature of loss. For example, the potential for productivity loss resulting from a destroyed or stolen asset depends upon how critical that asset is to the organization's productivity. If a critical asset is simply illicitly accessed, there is no direct productivity loss. Similarly, the destruction of a highly sensitive asset that does not play a critical role in productivity would not directly result in a significant productivity loss. Yet that same asset, if disclosed, can result in significant loss of competitive advantage or reputation, and generate legal costs. The point is that it is the combination of the asset and type of action against the asset that determines the fundamental nature and degree of loss. Which action(s) a threat agent takes will be driven primarily by that agent's motive (e.g., financial gain, revenge, recreation, etc.) and the nature of the asset. For example, a threat agent bent on financial gain is less likely to destroy a critical server than they are to steal an easily pawned asset like a laptop.[5]

It is important to separate the concept of the event that a threat agent get in contact with the asset (even virtually, i.e. through the network) and the event that a threat agent act against the asset.[5]

OWASP collects a list of potential threat agents to prevent system designers, and programmers insert vulnerabilities in the software.[18]

Threat Agent = Capabilities + Intentions + Past Activities

These individuals and groups can be classified as follows:[18]

  • Non-Target Specific: Non-Target Specific Threat Agents are computer viruses, worms, trojans and logic bombs.
  • Employees: Staff, contractors, operational/maintenance personnel, or security guards who are annoyed with the company.
  • Organized Crime and Criminals: Criminals target information that is of value to them, such as bank accounts, credit cards or intellectual property that can be converted into money. Criminals will often make use of insiders to help them.
  • Corporations: Corporations are engaged in offensive information warfare or competitive intelligence. Partners and competitors come under this category.
  • Human, Unintentional: Accidents, carelessness.
  • Human, Intentional: Insider, outsider.
  • Natural: Flood, fire, lightning, meteor, earthquakes.

Threat source

[edit]

Threat sources are those who wish a compromise to occur. It is a term used to distinguish them from threat agents/actors who are those who carry out the attack and who may be commissioned or persuaded by the threat source to knowingly or unknowingly carry out the attack.[19]

Threat communities

[edit]
Threat communities
Subsets of the overall threat agent population that share key characteristics. The notion of threat communities is a powerful tool for understanding who and what we’re up against as we try to manage risk. For example, the probability that an organization would be subject to an attack from the terrorist threat community would depend in large part on the characteristics of your organization relative to the motives, intents, and capabilities of the terrorists. Is the organization closely affiliated with ideology that conflicts with known, active terrorist groups? Does the organization represent a high profile, high impact target? Is the organization a soft target? How does the organization compare with other potential targets? If the organization were to come under attack, what components of the organization would be likely targets? For example, how likely is it that terrorists would target the company information or systems?[5]
The following threat communities are examples of the human malicious threat landscape many organizations face:
  • Internal
    • Employees
    • Contractors (and vendors)
    • Partners
  • External
    • Cyber-criminals (professional hackers)
    • Spies
    • Non-professional hackers
    • Activists
    • Nation-state intelligence services (e.g., counterparts to the CIA, etc.)
    • Malware (virus/worm/etc.) authors

Threat action

[edit]

Threat action is an assault on system security.
A complete security architecture deals with both intentional acts (i.e. attacks) and accidental events.[20]

Various kinds of threat actions are defined as subentries under "threat consequence".

Threat analysis

[edit]

Threat analysis is the analysis of the probability of occurrences and consequences of damaging actions to a system.[1] It is the basis of risk analysis.

Threat modeling

[edit]

Threat modeling is a process that helps organizations identify and prioritize potential threats to their systems. It involves analyzing the system's architecture, identifying potential threats, and prioritizing them based on their impact and likelihood. By using threat modeling, organizations can develop a proactive approach to security and prioritize their resources to address the most significant risks.[21]

Threat intelligence

[edit]

Threat intelligence is the practice of collecting and analyzing information about potential and current threats to an organization. This information can include indicators of compromise, attack techniques, and threat actor profiles. By using threat intelligence, organizations can develop a better understanding of the threat landscape and improve their ability to detect and respond to threats.[22]

Threat consequence

[edit]

Threat consequence is a security violation that results from a threat action.[1]
Includes disclosure, deception, disruption, and usurpation.

The following subentries describe four kinds of threat consequences, and also list and describe the kinds of threat actions that cause each consequence.[1] Threat actions that are accidental events are marked by "*".

"Unauthorized disclosure" (a threat consequence)
A circumstance or event whereby an entity gains access to data for which the entity is not authorized. (See: data confidentiality.). The following threat actions can cause unauthorized disclosure:
"Exposure"
A threat action whereby sensitive data is directly released to an unauthorized entity. This includes:
"Deliberate Exposure"
Intentional release of sensitive data to an unauthorized entity.
"Scavenging"
Searching through data residue in a system to gain unauthorized knowledge of sensitive data.
* "Human error"
Human action or inaction that unintentionally results in an entity gaining unauthorized knowledge of sensitive data.
* "Hardware/software error"
System failure that results in an entity gaining unauthorized knowledge of sensitive data.
"Interception":
A threat action whereby an unauthorized entity directly accesses sensitive data travelling between authorized sources and destinations. This includes:
"Theft"
Gaining access to sensitive data by stealing a shipment of a physical medium, such as a magnetic tape or disk, that holds the data.
"Wiretapping (passive)"
Monitoring and recording data that is flowing between two points in a communication system. (See: wiretapping.)
"Emanations analysis"
Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.
"Inference"
A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of communications. This includes:
"Traffic analysis"
Gaining knowledge of data by observing the characteristics of communications that carry the data.
"Signals analysis"
Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data.
"Intrusion"
A threat action whereby an unauthorized entity gains access to sensitive data by circumventing a system's security protections. This includes:
"Trespass"
Gaining unauthorized physical access to sensitive data by circumventing a system's protections.
"Penetration"
Gaining unauthorized logical access to sensitive data by circumventing a system's protections.
"Reverse engineering"
Acquiring sensitive data by disassembling and analyzing the design of a system component.
"Cryptanalysis"
Transforming encrypted data into plain text without having prior knowledge of encryption parameters or processes.
"Deception" (a threat consequence)
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. The following threat actions can cause deception:
"Masquerade"
A threat action whereby an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
"Spoof"
Attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
"Malicious logic"
In context of masquerade, any hardware, firmware, or software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.
"Falsification"
A threat action whereby false data deceives an authorized entity. (See: active wiretapping.)
"Substitution"
Altering or replacing valid data with false data that serves to deceive an authorized entity.
"Insertion"
Introducing false data that serves to deceive an authorized entity.
"Repudiation"
A threat action whereby an entity deceives another by falsely denying responsibility for an act.
"False denial of origin"
Action whereby the originator of data denies responsibility for its generation.
"False denial of receipt"
Action whereby the recipient of data denies receiving and possessing the data.
"Disruption" (a threat consequence)
A circumstance or event that interrupts or prevents the correct operation of system services and functions. (See: denial of service.) The following threat actions can cause disruption:
"Incapacitation"
A threat action that prevents or interrupts system operation by disabling a system component.
"Malicious logic"
In the context of incapacitation, any hardware, firmware, or software (e.g., logic bomb) intentionally introduced into a system to destroy system functions or resources.
"Physical destruction"
Deliberate destruction of a system component to interrupt or prevent system operation.
* "Human error"
Action or inaction that unintentionally disables a system component.
* "Hardware or software error"
Error that causes failure of a system component and leads to disruption of system operation.
* "Natural disaster"
Any natural disaster (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.[20]
"Corruption"
A threat action that undesirably alters system operation by adversely modifying system functions or data.
"Tamper"
In the context of corruption, deliberate alteration of a system's logic, data, or control information to interrupt or prevent correct operation of system functions.
"Malicious logic"
In the context of corruption, any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data.
* "Human error"
Human action or inaction that unintentionally results in the alteration of system functions or data.
* "Hardware or software error"
Error that results in the alteration of system functions or data.
* "Natural disaster"
Any natural event (e.g. power surge caused by lightning) that alters system functions or data.[20]
"Obstruction"
A threat action that interrupts delivery of system services by hindering system operations.
"Interference"
Disruption of system operations by blocking communications or user data or control information.
"Overload"
Hindrance of system operation by placing excess burden on the performance capabilities of a system component. (See: flooding.)
"Usurpation" (a threat consequence)
A circumstance or event that results in the control of system services or functions by an unauthorized entity. The following threat actions can cause usurpation:
"Misappropriation"
A threat action whereby an entity assumes unauthorized logical or physical control of a system resource.
"Theft of service"
Unauthorized use of service by an entity.
"Theft of functionality"
Unauthorized acquisition of actual hardware, software, or firmware of a system component.
"Theft of data"
Unauthorized acquisition and use of data.
"Misuse"
A threat action that causes a system component to perform a function or service that is detrimental to system security.
"Tamper"
In the context of misuse, deliberate alteration of a system's logic, data, or control information to cause the system to perform unauthorized functions or services.
"Malicious logic"
In the context of misuse, any hardware, software, or firmware intentionally introduced into a system to perform or control the execution of an unauthorized function or service.
"Violation of permissions"
Action by an entity that exceeds the entity's system privileges by executing an unauthorized function.

Threat landscape or environment

[edit]

A collection of threats in a particular domain or context, with information on identified vulnerable assets, threats, risks, threat actors and observed trends.[23][24]

Threat management

[edit]

Threats should be managed by operating an ISMS, performing all the IT risk management activities foreseen by laws, standards and methodologies.

Very large organizations tend to adopt business continuity management plans in order to protect, maintain and recover business-critical processes and systems. Some of these plans are implemented by computer security incident response team (CSIRT).

Threat management must identify, evaluate, and categorize threats. There are two primary methods of threat assessment:

Many organizations perform only a subset of these methods, adopting countermeasures based on a non-systematic approach, resulting in computer insecurity.

Information security awareness is a significant market. There has been a lot of software developed to deal with IT threats, including both open-source software and proprietary software.[25]

Cyber threat management

[edit]

Threat management involves a wide variety of threats including physical threats like flood and fire. While ISMS risk assessment process does incorporate threat management for cyber threats such as remote buffer overflows the risk assessment process doesn't include processes such as threat intelligence management or response procedures.

Cyber threat management (CTM) is emerging as the best practice for managing cyber threats beyond the basic risk assessment found in ISMS. It enables early identification of threats, data-driven situational awareness, accurate decision-making, and timely threat mitigating actions.[26]

CTM includes:

  • Manual and automated intelligence gathering and threat analytics
  • Comprehensive methodology for real-time monitoring including advanced techniques such as behavioral modelling
  • Use of advanced analytics to optimize intelligence, generate security intelligence, and provide Situational Awareness
  • Technology and skilled people leveraging situational awareness to enable rapid decisions and automated or manual actions

Threat hunting

[edit]

Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions."[27] This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems, and SIEMs, which typically involve an investigation after there has been a warning of a potential threat, or an incident has occurred.

Threat hunting can be a manual process, in which a security analyst sifts through various data information using their knowledge and familiarity with the network to create hypotheses about potential threats. To be even more effective and efficient, however, threat hunting can be partially automated, or machine-assisted, as well. In this case, the analyst utilizes software that harnesses machine learning and user and entity behavior analytics (UEBA) to inform the analyst of potential risks. The analyst then investigates these potential risks, tracking suspicious behaviour in the network. Thus hunting is an iterative process, meaning that it must be continuously carried out in a loop, beginning with a hypothesis. There are three types of hypotheses:

  • Analytics-driven: "Machine-learning and UEBA, used to develop aggregated risk scores that can also serve as hunting hypotheses"[28]
  • Situational-awareness driven: "Crown Jewel analysis, enterprise risk assessments, company- or employee-level trends"[28]
  • Intelligence-driven: "Threat intelligence reports, threat intelligence feeds, malware analysis, vulnerability scans"[28]

The analyst researches their hypothesis by going through vast amounts of data about the network. The results are then stored so that they can be used to improve the automated portion of the detection system and to serve as a foundation for future hypotheses.

The SANS Institute has conducted research and surveys on the effectiveness of threat hunting to track and disrupt cyber adversaries as early in their process as possible. According to a survey performed in 2019, "61% [of the respondents] report at least an 11% measurable improvement in their overall security posture" and 23.6% of the respondents have experienced a 'significant improvement' in reducing the dwell time.[29]

Threat Mitigation

[edit]

To protect yourself from computer threats, it's essential to keep your software up-to-date, use strong and unique passwords, and be cautious when clicking on links or downloading attachments. Additionally, using antivirus software and regularly backing up your data can help mitigate the impact of a threat.

See also

[edit]

References

[edit]
  1. ^ a b c d e f R. Shirey (May 2000). Internet Security Glossary. Internet Engineering Task Force. doi:10.17487/RFC2828. RFC 2828. Informational. Obsoleted by RFC 4949.
  2. ^ "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" (PDF). Carc.nist.gov. Retrieved 5 November 2013.
  3. ^ "Glossary – ENISA". Enisa.europa.eu. 24 July 2009. Retrieved 5 November 2013.
  4. ^ Technical Standard Risk Taxonomy ISBN 1-931624-77-1 Document Number: C081 Published by The Open Group, January 2009.
  5. ^ a b c d e f "An Introduction to Factor Analysis of Information Risk (FAIR)" (PDF). Riskmanagementinsight.com. November 2006. Archived from the original (PDF) on 18 November 2014. Retrieved 5 November 2013.
  6. ^ Schou, Corey (1996). Handbook of INFOSEC Terms, Version 2.0. CD-ROM (Idaho State University & Information Systems Security Organization)
  7. ^ "Glossary of Terms". Niatec.info. 12 December 2011. Retrieved 13 February 2012.
  8. ^ Wright, Joe; Jim Harmening (2009). "15". In Vacca, John (ed.). Computer and Information Security Handbook. Morgan Kaufmann Publications. Elsevier Inc. p. 257. ISBN 978-0-12-374354-1.
  9. ^ "ISACA THE RISK IT FRAMEWORK" (PDF). Isaca.org. Retrieved 5 November 2013. (registration required)
  10. ^ Security engineering:a guide to building dependable distributed systems, second edition, Ross Anderson, Wiley, 2008 – 1040 pages ISBN 978-0-470-06852-6, Chapter 2, page 17
  11. ^ Brian Prince (7 April 2009). "Using Facebook to Social Engineer Your Way Around Security". Eweek.com. Retrieved 5 November 2013.
  12. ^ "Social engineering via Social networking". Networkworld.com. 4 October 2010. Retrieved 13 February 2012.
  13. ^ ISO/IEC, "Information technology – Security techniques-Information security risk management" ISO/IEC FIDIS 27005:2008
  14. ^ "Ransomware Trends, Statistics and Facts in 2023". Security. Retrieved 9 May 2023.
  15. ^ "The STRIDE Threat Model". msdn.microsoft.com. 12 November 2009. Retrieved 28 March 2017.
  16. ^ "McAfee Threat Intelligence | McAfee, Inc". Mcafee.com. Retrieved 13 February 2012.
  17. ^ "Threatcon – Symantec Corp". Symantec.com. 10 January 2012. Archived from the original on 9 March 2007. Retrieved 13 February 2012.
  18. ^ a b c "Category:Threat Agent". OWASP. 9 December 2011. Retrieved 13 February 2012.
  19. ^ HMG IA Standard No. 1 Technical Risk Assessment
  20. ^ a b c "FIPS PUB 31 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION : JUNE 1974" (PDF). Tricare.mil. Archived from the original (PDF) on 24 November 2023. Retrieved 5 November 2013.
  21. ^ "Threat Modeling | OWASP Foundation". owasp.org. Retrieved 9 May 2023.
  22. ^ "What is Threat Intelligence? | IBM". www.ibm.com. 2 November 2022. Retrieved 9 May 2023.
  23. ^ ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media (1 Dec 2014)
  24. ^ ENISA Threat Landscape 2013–Overview of Current and Emerging Cyber-Threats (11 Dec 2013)
  25. ^ See Category:Computer security companies, Category:Free security software, and Category:Computer security software companies for partial lists.
  26. ^ "What is Cyber Threat Management". ioctm.org. Retrieved 28 January 2015.
  27. ^ "Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge – TechRepublic". TechRepublic. Retrieved 7 June 2016.
  28. ^ a b c "Cyber Threat Hunting – Sqrrl". Sqrrl. Retrieved 7 June 2016.
  29. ^ Fuchs, Mathias; Lemon, Joshua. "SANS 2019 Threat Hunting Survey: The Differing Needs of New and Experienced Hunters" (PDF). SANS Institute. pp. 2, 16. Archived (PDF) from the original on 1 March 2022. Retrieved 11 May 2022.
[edit]
鸟吃什么东西 怀孕两周有什么症状 为什么总长火疖子 逆来顺受什么意思 属牛男和什么属相最配
吃什么受孕率又快又高 小工是什么意思 中指戴戒指代表什么 单人旁的字有什么 浅紫色配什么颜色好看
SS是什么 皮肤黑吃什么会变白 孕酮是什么意思 粉尘螨是什么 桂林有什么好玩的
凤凰单枞是什么茶 容易做梦是什么原因引起的 是什么有什么 什么网站可以看三级片 高压氧治疗有什么作用
阿华田是什么hcv9jop5ns9r.cn 果脯是什么东西hcv9jop6ns0r.cn 女性肾火旺有什么症状hcv9jop3ns7r.cn 一什么人家hcv9jop7ns4r.cn 手汗症是什么原因hcv9jop6ns5r.cn
peep是什么意思hcv8jop2ns9r.cn crp是什么检查项目hcv7jop5ns4r.cn 小三阳吃什么食物好得快hcv8jop8ns3r.cn 痛风发作吃什么药hcv8jop9ns2r.cn 女人为什么要穿高跟鞋hcv9jop3ns8r.cn
18k是什么意思hcv8jop3ns3r.cn 哺乳期吃避孕药对孩子有什么影响hcv8jop7ns4r.cn 上海有什么特色美食hcv8jop9ns2r.cn 换手率是什么意思96micro.com 破伤风针什么时候打hcv7jop6ns3r.cn
cmb是什么意思hcv9jop3ns8r.cn 血管堵塞用什么药hcv9jop4ns8r.cn 儿保做些什么检查项目hcv8jop1ns5r.cn 什么时间吃水果比较好qingzhougame.com 吃什么吐什么喝水都吐怎么办hcv9jop1ns5r.cn
百度