A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of an "act of God" such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.
A more comprehensive definition, tied to an Information assurance point of view, can be found in "Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems" by NIST of United States of America :Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
National Information Assurance Glossary defines threat as: :Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. ENISA gives a similar definition: :Any circumstance or event with the potential to adversely impact an asset [G.3] through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
The Open Group defines threat in as: :Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events,etc.); malicious actors; errors; failures.
Factor Analysis of Information Risk defines threat as: :threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur.
National Information Assurance Training and Education Center gives a more articulated definition of threat:
:The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i. e. , perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair,
+ - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+ | An Attack: | |Counter- | | A System Resource: | | i.e., A Threat Action | | measure | | Target of the Attack | | +----------+ | | | | +-----------------+ | | | Attacker |<==================||<========= | | | | i.e., | Passive | | | | | Vulnerability | | | | A Threat |<=================>||<========> | | | | Agent | or Active | | | | +-------|||-------+ | | +----------+ Attack | | | | VVV | | | | | | Threat Consequences | + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromises the Confidentiality, Integrity or Availability properties of resources (potentially different that the vulnerable one) of the organization and others involved parties (customers, suppliers). The so called CIA triad is the basis of Information Security.
The attack can be active when it attempts to alter system resources or affect their operation: so it compromises Integrity or Availability. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources: so it compromises Confidentiality.
OWASP (see figure) depicts the same phenomenon in slightly different terms: a threat agent through an attack vector exploits a weakness (vulnerability) of the system and the related security controls causing an technical impact on an IT resource (asset) connected to a business impact.
A set of policies concerned with information security management, the Information Security Management Systems (ISMS), has been developed to manage, according to Risk management principles, the countermeasures in order to accomplish to a security strategy set up following rules and regulations applicable in a country. Countermeasures are also called Security controls; when applied to the transmission of information are named security services.
The overall picture represents the risk factors of the risk scenario.
The widespread of computer dependencies and the consequent raising of the consequence of a successful attack, led to a new term cyberwarfare.
It should be noted that nowadays the many real attacks exploit Psychology at least as much as technology. Phishing and Pretexting and other methods are called social engineering techniques. The Web 2.0 applications, specifically Social network services, can be a mean to get in touch with people in charge of system administration or even system security, inducing them to reveal sensitive information. One famous case is Robin Sage.
The most widespread documentation on Computer insecurity is about technical threats such computer virus, trojan and other malware, but a serious study to apply cost effective countermeasures can only be conducted following a rigorous IT risk analysis in the framework of an ISMS: a pure technical approach will let out the psychological attacks, that are increasing threats.
Microsoft used to risk rating security threats using five categories in a classification called DREAD: Risk assessment model. The model is considered obsolete by Microsoft. The categories were:
The DREAD name comes from the initials of the five categories listed.
The spread over a network of threats can led to dangerous situations. In military and civil fields, threat level as been defined: for example INFOCOM is a threat level used by USA. Leading antivirus software vendors publish global threat level on their websites
It is important to separate the concept of the event that a threat agent get in contact with the asset (even virtually, i.e. through the network) and the event that a threat agent act against the asset.
OWASP collects a list of potential threat agents in order to prevent system designers and programmers insert vulnerabilities in the software.
The term Threat Agent is used to indicate an individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company.
Threat Agent = Capabilities + Intentions + Past Activities
These individuals and groups can be classified as follows:
The following subentries describe four kinds of threat consequences, and also list and describe the kinds of threat actions that cause each consequence. Threat actions that are accidental events are marked by "*". ;"(Unauthorized) Disclosure" (a threat consequence) : A circumstance or event whereby an entity gains access to data for which the entity is not authorized. (See: data confidentiality.). The following threat actions can cause unauthorized disclosure: :;"Exposure": :: A threat action whereby sensitive data is directly released to an unauthorized entity. This includes: ::; "Deliberate Exposure": ::: Intentional release of sensitive data to an unauthorized entity. ::; "Scavenging": ::: Searching through data residue in a system to gain unauthorized knowledge of sensitive data. ::; * "Human error": :::Human action or inaction that unintentionally results in an entity gaining unauthorized knowledge of sensitive data. ::; * "Hardware/software error": ::: System failure that results in an entity gaining unauthorized knowledge of sensitive data. :;"Interception": :: A threat action whereby an unauthorized entity directly accesses sensitive data travelling between authorized sources and destinations. This includes: ::; "Theft": Gaining access to sensitive data by stealing a shipment of a physical medium, such as a magnetic tape or disk, that holds the data. ::; "Wiretapping (passive)": Monitoring and recording data that is flowing between two points in a communication system. (See: wiretapping.) ::; "Emanations analysis": Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data. (See: emanation.) :; "Inference": A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of communications. This includes: ::; "Traffic analysis": Gaining knowledge of data by observing the characteristics of communications that carry the data. ::; "Signals analysis": Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data. (See: emanation.) :; "Intrusion": A threat action whereby an unauthorized entity gains access to sensitive data by circumventing a system's security protections. This includes: ::; "Trespass": Gaining unauthorized physical access to sensitive data by circumventing a system's protections. ::; "Penetration": Gaining unauthorized logical access to sensitive data by circumventing a system's protections. ::; "Reverse engineering": Acquiring sensitive data by disassembling and analyzing the design of a system component. ::; "Cryptanalysis": Transforming encrypted data into plain text without having prior knowledge of encryption parameters or processes. ;"Deception" (a threat consequence): : A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. The following threat actions can cause deception: :; "Masquerade": A threat action whereby an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity. ::;"Spoof": Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. ::; "Malicious logic": In context of masquerade, any hardware, firmware, or software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic. :; "Falsification": A threat action whereby false data deceives an authorized entity. (See: active wiretapping.) ::; "Substitution": Altering or replacing valid data with false data that serves to deceive an authorized entity. ::; "Insertion": Introducing false data that serves to deceive an authorized entity. :; "Repudiation": A threat action whereby an entity deceives another by falsely denying responsibility for an act. ::; "False denial of origin": Action whereby the originator of data denies responsibility for its generation. ::;. "False denial of receipt": Action whereby the recipient of data denies receiving and possessing the data. ; "Disruption" (a threat consequence): : A circumstance or event that interrupts or prevents the correct operation of system services and functions. (See: denial of service.) The following threat actions can cause disruption: :; "Incapacitation": A threat action that prevents or interrupts system operation by disabling a system component. ::; "Malicious logic": In context of incapacitation, any hardware, firmware, or software (e.g., logic bomb) intentionally introduced into a system to destroy system functions or resources. ::; "Physical destruction": Deliberate destruction of a system component to interrupt or prevent system operation. ::; * "Human error": Action or inaction that unintentionally disables a system component. ::; * "Hardware or software error": Error that causes failure of a system component and leads to disruption of system operation. ::; * "Natural disaster": Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component. :; "Corruption": A threat action that undesirably alters system operation by adversely modifying system functions or data. ::; "Tamper": In context of corruption, deliberate alteration of a system's logic, data, or control information to interrupt or prevent correct operation of system functions. ::; "Malicious logic": In context of corruption, any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data. ::; * "Human error": Human action or inaction that unintentionally results in the alteration of system functions or data. ::; * "Hardware or software error": Error that results in the alteration of system functions or data. ::; * "Natural disaster": Any "act of God" (e.g., power surge caused by lightning) that alters system functions or data. :; "Obstruction": A threat action that interrupts delivery of system services by hindering system operations. ::; "Interference": Disruption of system operations by blocking communications or user data or control information. ::; "Overload": Hindrance of system operation by placing excess burden on the performance capabilities of a system component. (See: flooding.) ; "Usurpation" (a threat consequence): : A circumstance or event that results in control of system services or functions by an unauthorized entity. The following threat actions can cause usurpation: :; "Misappropriation": A threat action whereby an entity assumes unauthorized logical or physical control of a system resource. ::; "Theft of service": Unauthorized use of service by an entity. ::; "Theft of functionality": Unauthorized acquisition of actual hardware, software, or firmware of a system component. ::; "Theft of data": Unauthorized acquisition and use of data. :; "Misuse": A threat action that causes a system component to perform a function or service that is detrimental to system security. ::; "Tamper": In context of misuse, deliberate alteration of a system's logic, data, or control information to cause the system to perform unauthorized functions or services. ::; "Malicious logic": In context of misuse, any hardware, software, or firmware intentionally introduced into a system to perform or control execution of an unauthorized function or service. ::;"Violation of permissions": Action by an entity that exceeds the entity's system privileges by executing an unauthorized function.
Very large organizations tend to adopt business continuity management plans in order to protect, maintain and recover business-critical processes and systems. Some of these plans foreseen to set up computer security incident response team (CSIRT) or computer emergency response team (CERT)
There are some kind of verification of the threat management process:
Information security awareness generates quite a large business: (see the :category:Computer security companies).
Countermeasures may include tools such as firewalls, intrusion detection system and anti-virus software, Physical Security measures, policies and procedures such as regular backups and configuration hardening, training such as security awareness education.
A lot of software has been developed to deal with IT threats:
Category:Computer network security Category:Computer security Category:Computer security exploits Category:Security compliance
uk:Інформаційна загрозаThis text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.