Unit 2 | HTCS 601 Notes | Security Assessment and Risk Analysis Notes | Aktu Notes


Unit 2 | HTCS 601 Notes | Security Assessment and Risk Analysis Notes | Aktu Notes



    Threats to and Vulnerabilities of Systems

    Threats

    A threat is anything that can cause harm to a computer system, network, or data.
    Threats can:
    • Steal information

    • Damage files

    • Stop services

    • Leak data to the wrong people
    Example: A hacker trying to break into a banking system is a threat.

    Major Categories of Threats


    Here are some common categories of threats:

    a. Fraud
    Using trickery or false actions to gain money or benefits.
    Example: Someone changing billing records in a company to get paid more.

    b. Hostile Intelligence Service (HOIS)
    These are foreign or criminal organizations that try to secretly steal sensitive or classified information.
    Example: A spy trying to gather secret defense or government data.

    c. Natural Threats
    Floods, earthquakes, fire, etc., that can destroy physical systems like servers and computers.

    d. Human Errors
    People accidentally deleting files, clicking phishing links, or misconfiguring a system.

    e. Malicious Attacks
    Viruses, malware, ransomware, DoS attacks, etc., which intentionally harm systems.

    Vulnerabilities


    Vulnerabilities are weak points in a system that threats can attack.

    Think of it like an open door in a house. A thief (threat) can enter easily because of the open door (vulnerability).

    Examples of vulnerabilities:
    • Weak passwords

    • Outdated software

    • No firewall or antivirus

    • Poorly trained staff

    Countermeasures

    To fight threats and fix vulnerabilities, we apply countermeasures.

    Assessments

    Assessments help find out what could go wrong in a system.

    Types of assessments:

    a. Surveys
    • Asking users questions to understand how they use the system and what risks may be present.

    • Example: A survey to check if employees use strong passwords.

    b. Inspections
    • Physically or digitally checking systems for flaws or risky practices.

    • Example: Checking if security patches are updated on all computers.

    Concepts of Risk Management


    Risk Management is the process of identifying, evaluating, and controlling risks to keep systems safe.

    Consequences

    When a risk is not controlled, consequences happen. These can be:

    a. Corrective Action

    Steps taken after a problem happens to fix it.
    Example: Restoring files from a backup after a ransomware attack.

    b. Risk Assessment

    Studying which parts of a system are at risk, what the threats are, and how likely they are to happen.
    Example: Risk of data loss if no backup system exists.

    Cost/Benefit Analysis and Implementation of Controls


    - Cost/Benefit Analysis means comparing how much it costs to apply a security control vs how much benefit or protection it provides.

    - We try to spend money only where it brings real protection.

    Example: If installing a firewall costs ₹10,000 but can prevent data loss worth ₹1,00,000 – it’s worth it.

    - Implementation of Controls means applying security solutions like:
    • Antivirus

    • Access control

    • Encryption

    • Backup systems

    Monitoring the Efficiency and Effectiveness of Controls


    Once we implement security controls, we must keep checking:
    • Are the controls working properly?

    • Are they blocking threats?

    • Are users still making mistakes?
    Example:
    • You install an antivirus (control).

    • You monitor if it's detecting and stopping viruses (effectiveness).

    • If not, you might upgrade or replace it.

    Example Problem – Unauthorized Disclosure


    Let’s say sensitive student data is leaked accidentally:

    - This is an unauthorized or inadvertent disclosure.

    - You must check:
    • Why did it happen?

    • What controls failed?

    • How can it be stopped next time?

    No comments:

    Post a Comment