SlideShare a Scribd company logo
1 of 3
Download to read offline
HOME  BLOGS  CYBER SECURITY: WHAT IS IT AND WHAT YOU NEED TO KNOW? BLOG LIST
Awards & Alliances
Categories

   Diversity +1.732.947.4119
CYBER SECURITY: WHAT IS IT AND WHAT YOU
NEED TO KNOW?
CYBERSECURITY
Cyber Security is a protection offered to an automated information system
in order to attain the applicable objectives of preserving the integrity,
availability and confidentiality of information system resources (includes
hardware, software, firmware, information/data, and telecommunications).
WHY DO YOU NEED ONE?
Hackers intrude into system to get hold of sensitive information and sell it for
a price. There were many instances where well-established organizations like
financial institutions lost valuable information of customers. Some of them
are
• Hong Kong Stock Exchange (Aug 2011) — DDoS through BOTNET
• PenFed (Dec 2010) — Malware from infected laptop
• CitySights (Sep 2010) — SQL injection
• EU Carbon Trading Exchange (Jan 2011) — Phishing
Similarly, there are many other retail companies, government organizations
which were hacked. Loosing sensitive data is lose to any organization
towards trust.
WHAT IS CIA?
Confidentiality: Preserving authorized restrictions on information access
and disclosure, including means for protecting personal privacy and
proprietary information.A loss of confidentiality is the unauthorized
disclosure of information
Integrity: Guarding against improper information modification or
destruction, and includes ensuring information non-repudiation and
authenticity.A loss of integrity is the unauthorized modification or
destruction of information
Availability: Ensuring timely and reliable access to and use of information. A
loss of availability is the disruption of access to or use of information or an
information system
Data Science (29)
•
AI/Machine Learning (6)
•
Big Data (2)
•
Cloud (5)
•
Cybersecurity (5)
•
Salesforce CRM (2)
•
IoT (3)
•
Clinical (5)
•
Healthcare (5)
•
Life Sciences (6)
•
This & That (5)
•
Recruiting Strategy (16)
•
Diversity, Equity & Inclusion (1)
•
Software Development (1)
•
Life Sciences Healthcare Contact Us
Digital  Staffing  Company  Knowledge Center 
Life Sciences Healthcare Contact Us
Digital  Staffing  Company  Knowledge Center 
AND, SOME MORE:
Although the use of the CIA triad to define security objectives is well
established, some in the security field feel that additional concepts are
needed to present a complete picture:
Authenticity: The property of being genuine and being able to be verified and
trusted; confidence in the validity of a transmission, a message, or message
originator.
Accountability: The security goal that generates the requirement for actions
of an entity to be traced uniquely to that entity.
GUARD AGAINST WHAT?
There are different ways you can be posed to a security threat, here is the list
of some:
• Unauthorized Disclosure
• Exposure, Interception, Inference, Intrusion
• Deception
• Masquerade, Falsification, Repudiation
• Disruption
• Incapacitation, Corruption, Obstruction
• Usurpation
• Misappropriation, Misuse
GUARD WHAT?
Host
Hardware: A major threat is the threat to availability. Hardware is the most
vulnerable to attack and the least susceptible to automated controls.
Threats include accidental and deliberate damage to equipment as well as
theft. Theft of CDROMs and DVDs can lead to loss of confidentiality. Physical
and administrative security measures are needed to deal with these threats
Software: Includes the operating system, utilities, and application programs.
A key threat is an attack on availability. Software is often easy to delete.
Software can also be altered or damaged to render it useless. Careful
software configuration management can maintain high availability. A more
difficult problem is software modification (e.g. from virus/worm) that results in
a program that still functions but that behaves differently than before, which
is a threat to integrity/authenticity.
Data: Involves files and other forms of data controlled by individuals, groups,
and business organizations. Security concerns with respect to data are
broad, encompassing availability, confidentiality, and integrity. In the case of
availability, the concern is with the destruction of data files, which can occur
either accidentally or maliciously. The obvious concern with confidentiality is
the unauthorized reading of data files or databases. A less obvious secrecy
threat involves the analysis of data and manifests itself in the use of so-
called statistical databases, which provide summary or aggregate
information. Finally, data integrity is a major concern in most installations.
Modifications to data files can have consequences ranging from minor to
disastrous.
Network
• Involves routers, switches, and other firmware
• Must guard against passive and active attacks
• Passive attacks are eavesdropping
• Release of message contents
• Traffic analysis
• Are hard to detect, so aim to prevent
•Active attacks modify/ fake data
•Masquerade
•Replay
•Modification (Falsification)
•Denial of Service
Life Sciences Healthcare Contact Us
Digital  Staffing  Company  Knowledge Center 
© 2023 Rang Technologies Inc
All rights reserved
Terms of Use
Privacy Policy
Cookies Policy
Learn More
About Us
Why partner with us
Diversity
Press Release
Case Studies
Blog
Events
Learn More
Digital
Data Science & Analytics
AI & Machine Learning
Big Data
Cloud
Staffing
Google Reviews
4.5199
reviews
Provided by review-widget.net
Follow
90,698
Update cookies preferences
 BY: JIGAR PATEL  Apr 10 2018
•Hard to prevent, so aim to detect
About Rang Technologies:
Headquartered in New Jersey, Rang Technologies has dedicated over a
decade delivering innovative solutions and best talent to help businesses
get the most out of the latest technologies in their digital transformation
journey. Read More...
   
Rang Technologies Inc
Headquartered in New Jersey, Rang
Technologies has dedicated over a
decade delivering innovative solutions
and best talent to help businesses get
the most out of the latest technologies
in their digital transformation journey.
Read more...
Office Locations
Corporate Headquarters:
Rang Technologies Inc.
15 Corporate Place S, Suite 356,
Piscataway, NJ 08854
Phone
+1.732.947.4119
E-mail
General Inquiries: info@rangtech.com
Sales Inquiries: sales@rangtech.com
Facebook Feeds
United Stat India Canada




More Related Content

Similar to CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf

The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...Precise Testing Solution
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10ismaelhaider
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 

Similar to CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf (20)

Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Data security
Data securityData security
Data security
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf

  • 1. HOME  BLOGS  CYBER SECURITY: WHAT IS IT AND WHAT YOU NEED TO KNOW? BLOG LIST Awards & Alliances Categories     Diversity +1.732.947.4119 CYBER SECURITY: WHAT IS IT AND WHAT YOU NEED TO KNOW? CYBERSECURITY Cyber Security is a protection offered to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). WHY DO YOU NEED ONE? Hackers intrude into system to get hold of sensitive information and sell it for a price. There were many instances where well-established organizations like financial institutions lost valuable information of customers. Some of them are • Hong Kong Stock Exchange (Aug 2011) — DDoS through BOTNET • PenFed (Dec 2010) — Malware from infected laptop • CitySights (Sep 2010) — SQL injection • EU Carbon Trading Exchange (Jan 2011) — Phishing Similarly, there are many other retail companies, government organizations which were hacked. Loosing sensitive data is lose to any organization towards trust. WHAT IS CIA? Confidentiality: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.A loss of confidentiality is the unauthorized disclosure of information Integrity: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.A loss of integrity is the unauthorized modification or destruction of information Availability: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system Data Science (29) • AI/Machine Learning (6) • Big Data (2) • Cloud (5) • Cybersecurity (5) • Salesforce CRM (2) • IoT (3) • Clinical (5) • Healthcare (5) • Life Sciences (6) • This & That (5) • Recruiting Strategy (16) • Diversity, Equity & Inclusion (1) • Software Development (1) • Life Sciences Healthcare Contact Us Digital  Staffing  Company  Knowledge Center  Life Sciences Healthcare Contact Us Digital  Staffing  Company  Knowledge Center 
  • 2. AND, SOME MORE: Although the use of the CIA triad to define security objectives is well established, some in the security field feel that additional concepts are needed to present a complete picture: Authenticity: The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. GUARD AGAINST WHAT? There are different ways you can be posed to a security threat, here is the list of some: • Unauthorized Disclosure • Exposure, Interception, Inference, Intrusion • Deception • Masquerade, Falsification, Repudiation • Disruption • Incapacitation, Corruption, Obstruction • Usurpation • Misappropriation, Misuse GUARD WHAT? Host Hardware: A major threat is the threat to availability. Hardware is the most vulnerable to attack and the least susceptible to automated controls. Threats include accidental and deliberate damage to equipment as well as theft. Theft of CDROMs and DVDs can lead to loss of confidentiality. Physical and administrative security measures are needed to deal with these threats Software: Includes the operating system, utilities, and application programs. A key threat is an attack on availability. Software is often easy to delete. Software can also be altered or damaged to render it useless. Careful software configuration management can maintain high availability. A more difficult problem is software modification (e.g. from virus/worm) that results in a program that still functions but that behaves differently than before, which is a threat to integrity/authenticity. Data: Involves files and other forms of data controlled by individuals, groups, and business organizations. Security concerns with respect to data are broad, encompassing availability, confidentiality, and integrity. In the case of availability, the concern is with the destruction of data files, which can occur either accidentally or maliciously. The obvious concern with confidentiality is the unauthorized reading of data files or databases. A less obvious secrecy threat involves the analysis of data and manifests itself in the use of so- called statistical databases, which provide summary or aggregate information. Finally, data integrity is a major concern in most installations. Modifications to data files can have consequences ranging from minor to disastrous. Network • Involves routers, switches, and other firmware • Must guard against passive and active attacks • Passive attacks are eavesdropping • Release of message contents • Traffic analysis • Are hard to detect, so aim to prevent •Active attacks modify/ fake data •Masquerade •Replay •Modification (Falsification) •Denial of Service Life Sciences Healthcare Contact Us Digital  Staffing  Company  Knowledge Center 
  • 3. © 2023 Rang Technologies Inc All rights reserved Terms of Use Privacy Policy Cookies Policy Learn More About Us Why partner with us Diversity Press Release Case Studies Blog Events Learn More Digital Data Science & Analytics AI & Machine Learning Big Data Cloud Staffing Google Reviews 4.5199 reviews Provided by review-widget.net Follow 90,698 Update cookies preferences  BY: JIGAR PATEL  Apr 10 2018 •Hard to prevent, so aim to detect About Rang Technologies: Headquartered in New Jersey, Rang Technologies has dedicated over a decade delivering innovative solutions and best talent to help businesses get the most out of the latest technologies in their digital transformation journey. Read More...     Rang Technologies Inc Headquartered in New Jersey, Rang Technologies has dedicated over a decade delivering innovative solutions and best talent to help businesses get the most out of the latest technologies in their digital transformation journey. Read more... Office Locations Corporate Headquarters: Rang Technologies Inc. 15 Corporate Place S, Suite 356, Piscataway, NJ 08854 Phone +1.732.947.4119 E-mail General Inquiries: info@rangtech.com Sales Inquiries: sales@rangtech.com Facebook Feeds United Stat India Canada   