Monday, September 9, 2019

Building Your Vocabulary In Cyber Security

Building Your Vocabulary In Cyber Security Terms

We are going to see about Below 4 important terms
  1. Threats
  2. Risks
  3. Vulnerabilities 
  4. Exploits 
Threats
  • Threats are in any circumstance or event with the potential to adversely impact on organizational operations. Which includes reputation or image of the organization in the world, functions and mission or individual through unauthorised access modifying disclosure, destruction, modification of information belong to the organization, and doing denial of service (DOS).
  • A potential threat is a source to successfully exploit a particular system Vulnerability. 
  • Standards are determined by NIST (National Institute of Standard and technology) 
Example for threat 
  • Malware
  • Power outage
  • Social engineering
  • Intruder
  • Natural disaster like tsunami


Risks
  • Risk are validated by isc2 which is Information system security certification consortium     
        RISK =THREAT *VULNERABILITY-ISC2
  • There is a risk of stolen assets/info when an intruder can exploit a Vulnerability such as unlocked door

Vulnerability
  • Vulnerabilities is a weakness in design of networks, operational weakness by allowing all ports open., software unsecured code without encryption, and internal control. 
  • Which is based on ISACA(Information system audit and control association) 
Examples of Vulnerabilities are weak password, lack of antivirus software, irregular update of correct patches. 

Exploit
  • Exploits is a software tool designed to take advantage of a flaw in computer system. Typically a malicious purposes such as installing malware. 

Exploits and exploitation :
  • Leveraging vulnerability to cause harm to any system. 
  •  Gaining sensitive information via social engineering attack. 
  • Taking advantage of vulnerability to execute a code which can injected by hacker. 
 Exploits and exploitation are every time they will try to gather  information of victim

Secure yourself not to become a victim

Hill Station view

https://valparaihillsheaven.blogspot.com/2019/?m=1

No comments:

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....