APPENDIX B


Common Threats


Threats are any potential danger to information or systems, which can range from viruses, malicious code, and worms to natural disasters such as flood and fire. This appendix will explain common types of threats and the impact on information assurance.


NOTE Components of this list are inspired and adapted from the BSI (Bundesamt für Sicherheit in der Informationstechnik) threat list, derived from Information Security Risk Analysis by Thomas R. Peltier.

Threat: Force Majeure

Force majeure is a French term used in law that you may find in contracts. It means greater (superior) force; it refers to circumstances beyond the control of anyone. A prudent manager will act to reduce the effect of these threats. If not, it may be negligence. In some cultures, these are referred to as acts of God. The following are the different types of threats in this category:

res_300_images

res_300_image

res_300_image

Threat: Deliberate Acts

Frequently, deliberate acts by employees and others affect systems. These threat sources range from malicious software to unanticipated personal behavior changes or misconduct. Vigilance is imperative. The following are the different types of threats in this category:

res_300_image

res_300_image

res_300_image

res_300_image

res_300_image

res_300_image

Threat: Human Failure

Human failure is where human mistakes are inevitable. Frequently, it is symptomatic of poor training. In the MSR model, training is the foundation of addressing this issue. The following are the different types of threats in this category:

res_300_image

res_300_image

res_300_image

Threat: Technical Failure

Frequently, technical failures result from a disconformity or misunderstanding of training or policy. In many cases, technical failures can be predicted by a statistical process control (SPC) or other means. See Chapter 21 for more information. The following are the different types of threats in this category:

res_300_image

res_300_image

res_300_image

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset