What is asset and threat?

 Threats and Assets


The property of a laptop gadget may be classified as hardware, software, data,

and verbal exchange traces and networks. In this subsection, we in short describe those

4 classes and relate those to the ideas of integrity, confidentiality, and

availability added in Section 

What is assets and threats
What is asset and threat?



Computer and Network Assets, with Examples of Threats.


HARDWARE


A major threat to the hardware of computer systems is the threat of availability. Hardware is  most vulnerable to attack and  least vulnerable to automated controls. Threats include accidental and intentional damage to devices, as well as theft. The proliferation of personal computers and workstations and the widespread use of LANs increase the potential for loss in this area. Theft of CD-ROMs and DVDs can lead to loss of confidentiality.Physical and administrative security measures are required to deal with these threats



SOFTWARE 


Software includes the operating system, utilities and application programs. A major threat to software is an availability attack. Software, especially application software, is often easy to remove. Software can also be modified or damaged to make it unusable. Careful management of software configuration, including backing up the latest version of the  software, can maintain high availability.


A more difficult issue to address is software modifications that cause a program to still work but behave differently than before, posing a threat to integrity/authenticity. Computer viruses and related attacks fall into this category. A final issue is protection against software piracy. In general, although certain countermeasures are available,  the problem of unauthorized copying of software has not been solved.



DATA


Hardware and software security is often a concern of data center professionals or an individual concern of PC users. A more widespread issue is data security, which involves files and other forms of data controlled by individuals, groups, and commercial organizations. Data security concerns  are broad and include availability, confidentiality, and integrity. In the case of availability, the concern is  the destruction of files, which can happen accidentally or maliciously.


The obvious privacy concern  is  unauthorized reading of data files or databases, and this area has perhaps been the subject of  more research and effort than any other area of ​​computer security. A less obvious threat to confidentiality concerns data analysis  and is manifested in the use of so-called statistical databases that provide summary or aggregated information.


Presumably, the existence of aggregated information does not endanger the privacy of the individuals involved. However, as the use of statistical databases increases, there is  increasing potential for disclosure of personal data. In essence, the characteristics of the constituent persons can be identified through careful  analysis.


For example, if one table shows the total income of respondents A, B, C, and D and another shows the total income of respondents A, B, C, D, and E, the difference between the two totals would be  E. This problem is compounded by growing desire aggravated to combine records. In many cases, matching multiple datasets for consistency at different levels of aggregation requires access to individual entities. Therefore, individual entities that are the subject of privacy concerns are available at different stages  of record processing.


COMMUNICATION LINES AND NETWORKS


Attacks on network security  can be divided into passive attacks and active attacks. A passive attack attempts to learn or use system information, but does not affect system resources. An active attack attempts to alter system resources or compromise its operation.


Passive attack


Passive attacks are in the nature of spying or monitoring transmissions. The attacker's goal is to get hold of the transmitted information. Two types of passive attacks are news content publishing and traffic analysis. News content publishing is easy to understand. A telephone conversation, an e-mail message and a transmitted file may contain sensitive or confidential information.


We want to prevent an adversary from learning the content of these transmissions.A second type of passive attack, traffic analysis, is more subtle. Suppose we had a way to mask the content of messages or other information traffic so that even if adversaries intercepted the message, they couldn't extract the information from the message. The usual technique for masking content is encryption. If we had encryption protection, an adversary could still  observe the pattern of these messages. 


The adversary could determine the location and identity of the communicating hosts and  observe the frequency and duration of the messages exchanged.This information can be useful in guessing the type of communication that took place. Passive attacks are very difficult to detect as they do not involve any modification of the data.


 Typically,  message traffic appears to be sent and received normally, and neither the sender nor the receiver are aware that a third party has read the messages or observed the traffic pattern. However,  the success of these attacks can usually be prevented by encryption. Therefore, when dealing with passive attacks, the focus is more on prevention than detection.


Active attacks


Active attacks involve some modification of the data stream or creation of a spoofed stream and can be further divided into four categories: playback, masquerading, message modification and denial of service. Replay involves passively capturing a unit of  data  and then retransmitting it to produce an unauthorized effect. 


A masquerade occurs when an entity pretends to be another entity. A masquerade attack usually involves one of the other forms of active attack. For example, authentication sequences can be captured and replayed after a valid authentication sequence has occurred, allowing an authorized entity with low privileges to gain additional  privileges by  impersonating an entity with those privileges.


Message altering simply means altering part of a legitimate message, or delaying or rearranging messages  to produce an unauthorized effect. For example, a message that says "Allow John Smith to read confidential file accounts" is changed to "Allow Fred Brown to read confidential file accounts".The denial of service prevents or prevents the normal use or management of communication facilities. 


This attack can have a specific target; For example, an entity can delete all messages addressed to a specific destination (e.g. the security verification service). Another form of denial of service  is the disruption of an entire network, either by disabling the network or by overloading it with messages  to degrade performance. Active attacks have the opposite characteristics of passive attacks.


 While passive attacks are difficult to detect, there are measures  to prevent their success. On the other hand, it is quite difficult to absolutely prevent active attacks, as this would require physical protection of all facilities and communication channels at all times. Instead, the goal is to recognize them and  recover from any disruption or lag they cause. Because  detection is a deterrent, it can also help prevent.





No comments:

Post a Comment