1/6
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
interception threat
allow an attacker to gain access to an asset e.g., wiretapping, eavesdropping
interruption threat
allow an attacker to make the system unavailable for some time e.g., denial of service
modification threat
allow an attacker to tamper with an asset e.g., destroy or change data
fabrication threat
allow an attacker to insert false information e.g., email spoofing
control 1 avoidance
components not connected to the internet, data encryption
control 2 detection and neutralisation
detect unusual patterns of activity
control 3 exposure limitation and recovery
automated backup strategies