Threat Detection
   HOME

TheInfoList



OR:

In
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
, a threat is a potential negative action or event enabled by a
vulnerability Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally." The understanding of social and environmental vulnerability, as a methodological approach, involves ...
that results in an unwanted impact to a computer system or application. A threat can be either a negative "
intention An intention is a mental state in which a person commits themselves to a course of action. Having the plan to visit the zoo tomorrow is an example of an intention. The action plan is the ''content'' of the intention while the commitment is the ...
al" event (i.e. hacking: an individual cracker or a criminal organization) or an "
accident An accident is an unintended, normally unwanted event that was not deliberately caused by humans. The term ''accident'' implies that the event may have been caused by Risk assessment, unrecognized or unaddressed risks. Many researchers, insurers ...
al" negative event (e.g. the possibility of a computer malfunctioning, or the possibility of a
natural disaster A natural disaster is the very harmful impact on a society or community brought by natural phenomenon or Hazard#Natural hazard, hazard. Some examples of natural hazards include avalanches, droughts, earthquakes, floods, heat waves, landslides ...
event such as an
earthquake An earthquakealso called a quake, tremor, or tembloris the shaking of the Earth's surface resulting from a sudden release of energy in the lithosphere that creates seismic waves. Earthquakes can range in intensity, from those so weak they ...
, a
fire Fire is the rapid oxidation of a fuel in the exothermic chemical process of combustion, releasing heat, light, and various reaction Product (chemistry), products. Flames, the most visible portion of the fire, are produced in the combustion re ...
, or a
tornado A tornado is a violently rotating column of air that is in contact with the surface of Earth and a cumulonimbus cloud or, in rare cases, the base of a cumulus cloud. It is often referred to as a twister, whirlwind or cyclone, although the ...
) or otherwise a circumstance, capability, action, or event (
incident The Incident Command System (ICS) is a standardized approach to the command, control, and coordination of emergency response providing a common hierarchy within which responders from multiple agencies can be effective. ICS was initially develope ...
is often used as a blanket term). A ''
threat actor In cybersecurity, a threat actor, bad actor or malicious actor is either a person or a group of people that take part in Malice (law), malicious acts in the cyber realm including: computers, devices, systems, or Computer network, networks. Threat ...
'' who is an individual or group that can perform the threat action, such as exploiting a vulnerability to actualise a negative impact. An '' exploit'' is a vulnerability that a threat actor used to cause an incident.


Standard definitions

A more comprehensive definition, tied to an
Information assurance Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and data transmission, transmission of information. Information assurance includes protection of the data integrity, inte ...
point of view, can be found in "''Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems''" by
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
of
United States of America The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 states and a federal capital district, Washington, D.C. The 48 contiguo ...
:''Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability''.
National Information Assurance Glossary Committee on National Security Systems Instruction No. 4009, National Information Assurance Glossary, published by the United States federal government, is an unclassified glossary of Information security terms intended to provide a common vocabular ...
defines threat as: :''Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.'' ENISA gives a similar definition: :''Any circumstance or event with the potential to adversely impact an asset .3through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.''
The Open Group The Open Group is a global consortium that seeks to "enable the achievement of business objectives" by developing " open, vendor-neutral technology standards and certifications." It has 900+ member organizations and provides a number of services ...
defines threat as: :''Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events, etc.); malicious actors; errors; failures''.
Factor analysis of information risk Factor analysis of information risk (FAIR) is a taxonomy of the factors that contribute to risk and how they affect each other. It is primarily concerned with establishing accurate probabilities for the frequency and magnitude of data loss events ...
defines threat as: :''threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur.''
National Information Assurance Training and Education Center The National Information Assurance Training and Education Center (NIATEC) is an American consortium of academic, industry, and government organizations to improve the literacy, awareness, training and education standards in Information Assurance ...
gives a more articulated definition of threat: :''The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i.e., perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, , suggesting the nature of these occurrences but not the details (details are specific to events). 7. The potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to a body of knowledge).''


Phenomenology

The term "threat" relates to some other basic security terms as shown in the following diagram: A resource (both physical or logical) can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromise the
confidentiality Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information. Legal confidentiality By law, la ...
,
integrity Integrity is the quality of being honest and having a consistent and uncompromising adherence to strong moral and ethical principles and values. In ethics, integrity is regarded as the honesty and Honesty, truthfulness or of one's actions. Integr ...
or
availability In reliability engineering, the term availability has the following meanings: * The degree to which a system, subsystem or equipment is in a specified operable and committable state at the start of a mission, when the mission is called for at ...
properties of resources (potentially different than the vulnerable one) of the organization and others involved parties (customers, suppliers).
The so-called
CIA triad Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
is the basis of
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
. The attack can be ''active'' when it attempts to alter system resources or affect their operation: so it compromises Integrity or Availability. A "''
passive attack A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system solely based upon observed data (i.e. the ciphertext). This can also include known plaintext attac ...
''" attempts to learn or make use of information from the system but does not affect system resources: so it compromises Confidentiality.
OWASP The Open Worldwide Application Security Project (formerly Open Web Application Security Project) (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the fields of Io ...
(see figure) depicts the same phenomenon in slightly different terms: a threat agent through an attack vector exploits a weakness (vulnerability) of the system and the related
security controls Security controls or security measures are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. In the field of information security, such co ...
causing a technical impact on an IT resource (asset) connected to a business impact. A set of policies concerned with information security management, the
Information security management system Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The co ...
s (ISMS), has been developed to manage, according to
risk management Risk management is the identification, evaluation, and prioritization of risks, followed by the minimization, monitoring, and control of the impact or probability of those risks occurring. Risks can come from various sources (i.e, Threat (sec ...
principles, the
countermeasures A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
in order to accomplish to a security strategy set up following rules and regulations applicable in a country. Countermeasures are also called security controls; when applied to the transmission of information are named
security services Security Service or security service may refer to: Government * Security agency, a nation's institution for intelligence gathering * List of security agencies (MI5, NSA, KGB, etc.) * (SD), Nazi German agency which translates as "Security Servi ...
. The overall picture represents the
risk factors In epidemiology, a risk factor or determinant is a variable associated with an increased risk of disease or infection. Due to a lack of harmonization across disciplines, determinant, in its more widely accepted scientific meaning, is often ...
of the risk scenario. The widespread of computer dependencies and the consequent raising of the consequence of a successful attack, led to a new term
cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
. Nowadays the many real attacks exploit
Psychology Psychology is the scientific study of mind and behavior. Its subject matter includes the behavior of humans and nonhumans, both consciousness, conscious and Unconscious mind, unconscious phenomena, and mental processes such as thoughts, feel ...
at least as much as technology.
Phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
and
Pretexting Pretexting is a type of social engineering attack that involves a situation, or pretext, created by an attacker in order to lure a victim into a vulnerable situation and to trick them into giving private information, specifically information that ...
and other methods are called social engineering techniques. The
Web 2.0 Web 2.0 (also known as participative (or participatory) web and social web) refers to websites that emphasize user-generated content, ease of use, participatory culture, and interoperability (i.e., compatibility with other products, systems, a ...
applications, specifically
Social network service A social networking service (SNS), or social networking site, is a type of online social media platform which people use to build social networks or social relationships with other people who share similar personal or career content, interests ...
s, can be a mean to get in touch with people in charge of system administration or even system security, inducing them to reveal sensitive information. One famous case is
Robin Sage Robin Sage is a fictional American cyber threat analyst. She was created in December 2009 by Thomas Ryan, a security specialist and white hat hacker from New York City. Her name was taken from a training exercise of United States Army Special ...
. The most widespread documentation on
computer insecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
is about technical threats such as a
computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
,
trojan Trojan or Trojans may refer to: * Of or from the ancient city of Troy * Trojan language, the language of the historical Trojans Arts and entertainment Music * '' Les Troyens'' ('The Trojans'), an opera by Berlioz, premiered part 1863, part 18 ...
and other
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, but a serious study to apply cost effective countermeasures can only be conducted following a rigorous IT risk analysis in the framework of an ISMS: a pure technical approach will let out the psychological attacks that are increasing threats.


Threats classification

Threats can be classified according to their type and origin:ISO/IEC, "Information technology – Security techniques-Information security risk management" ISO/IEC FIDIS 27005:2008 * Types of threats: ** Physical damage: fire, water, pollution ** Natural events: climatic, seismic, volcanic ** Loss of essential services: electrical power, air conditioning, telecommunication ** Compromise of information: eavesdropping, theft of media, retrieval of discarded materials ** Technical failures: equipment, software, capacity saturation ** Compromise of functions: error in use, abuse of rights, denial of actions Note that a threat type can have multiple origins. * Deliberate: aiming at information asset ** spying ** illegal processing of data * Accidental ** equipment failure ** software failure * Environmental ** natural event ** loss of power supply *Negligence: Known but neglected factors, compromising the network safety and sustainability


Threats Trends

Recent trends in computer threats show an increase in ransomware attacks, supply chain attacks, and fileless malware. Ransomware attacks involve the encryption of a victim's files and a demand for payment to restore access. Supply chain attacks target the weakest links in a supply chain to gain access to high-value targets. Fileless malware attacks use techniques that allow malware to run in memory, making it difficult to detect.


Common Threats

Below are the few common emerging threats: *     
Computer virus A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
es *     
Trojan horses In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending befor ...
*     
Worms The World Register of Marine Species (WoRMS) is a taxonomic database that aims to provide an authoritative and comprehensive catalogue and list of names of marine organisms. Content The content of the registry is edited and maintained by scien ...
*     
Rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
s *     
Spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
*     
Adware Adware, often called advertising-supported software by its developers, is software that generates revenue by automatically displaying Online advertising, online advertisements in the user interface or on a screen presented during the installatio ...
*     
Ransomware Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
*      Fileless malware


Threat classification

Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
published a mnemonic, STRIDE, from the initials of threat groups: * Spoofing of user identity * Tampering * Repudiation * Information disclosure ( privacy breach or
Data leak A data breach, also known as data leakage, is "the unauthorized exposure, disclosure, or loss of personal information". Attackers have a variety of motives, from financial gain to political activism, political repression, and espionage. There a ...
) * Denial of Service (D.o.S.) * Elevation of privilege Microsoft previously rated the risk of security threats using five categories in a classification called DREAD: Risk assessment model. The model is considered obsolete by Microsoft. The categories were: * Damage – how bad would an attack be? * Reproducibility – how easy it is to reproduce the attack? * Exploitability – how much work is it to launch the attack? * Affected users – how many people will be impacted? * Discoverability – how easy it is to discover the threat? The DREAD name comes from the initials of the five categories listed. The spread over a network of threats can lead to dangerous situations. In military and civil fields, threat level has been defined: for example INFOCON is a threat level used by the US. Leading
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
vendors publish global threat level on their websites.


Associated terms


Threat agents or actors

The term ''Threat Agent'' is used to indicate an individual or group that can manifest a threat. It is fundamental to identify who would want to exploit the assets of a company, and how they might use them against the company.
Individuals within a threat population; Practically anyone and anything can, under the right circumstances, be a threat agent – the well-intentioned, but inept, computer operator who trashes a daily batch job by typing the wrong command, the regulator performing an audit, or the squirrel that chews through a data cable.
Threat agents can take one or more of the following actions against an asset: * Access – simple unauthorized access * Misuse – unauthorized use of assets (e.g., identity theft, setting up a porn distribution service on a compromised server, etc.) * Disclose – the threat agent illicitly discloses sensitive information * Modify – unauthorized changes to an asset * Deny access – includes destruction, theft of a non-data asset, etc. Each of these actions affects different assets differently, which drives the degree and nature of loss. For example, the potential for productivity loss resulting from a destroyed or stolen asset depends upon how critical that asset is to the organization's productivity. If a critical asset is simply illicitly accessed, there is no direct productivity loss. Similarly, the destruction of a highly sensitive asset that does not play a critical role in productivity would not directly result in a significant productivity loss. Yet that same asset, if disclosed, can result in significant loss of competitive advantage or reputation, and generate legal costs. The point is that it is the combination of the asset and type of action against the asset that determines the fundamental nature and degree of loss. Which action(s) a threat agent takes will be driven primarily by that agent's motive (e.g., financial gain, revenge, recreation, etc.) and the nature of the asset. For example, a threat agent bent on financial gain is less likely to destroy a critical server than they are to steal an easily pawned asset like a laptop. It is important to separate the concept of the event that a threat agent get in contact with the asset (even virtually, i.e. through the network) and the event that a threat agent act against the asset. OWASP collects a list of potential threat agents to prevent system designers, and programmers insert vulnerabilities in the software. Threat Agent = Capabilities + Intentions + Past Activities These individuals and groups can be classified as follows: * Non-Target Specific: Non-Target Specific Threat Agents are computer viruses, worms, trojans and logic bombs. * Employees: Staff, contractors, operational/maintenance personnel, or security guards who are annoyed with the company. * Organized Crime and Criminals: Criminals target information that is of value to them, such as bank accounts, credit cards or intellectual property that can be converted into money. Criminals will often make use of insiders to help them. * Corporations: Corporations are engaged in offensive information warfare or competitive intelligence. Partners and competitors come under this category. * Human, Unintentional: Accidents, carelessness. * Human, Intentional: Insider, outsider. * Natural: Flood, fire, lightning, meteor, earthquakes.


Threat source

Threat sources are those who wish a compromise to occur. It is a term used to distinguish them from threat agents/actors who are those who carry out the attack and who may be commissioned or persuaded by the threat source to knowingly or unknowingly carry out the attack.


Threat communities

;Threat communities :''Subsets of the overall threat agent population that share key characteristics. The notion of threat communities is a powerful tool for understanding who and what we’re up against as we try to manage risk. For example, the probability that an organization would be subject to an attack from the terrorist threat community would depend in large part on the characteristics of your organization relative to the motives, intents, and capabilities of the terrorists. Is the organization closely affiliated with ideology that conflicts with known, active terrorist groups? Does the organization represent a high profile, high impact target? Is the organization a soft target? How does the organization compare with other potential targets? If the organization were to come under attack, what components of the organization would be likely targets? For example, how likely is it that terrorists would target the company information or systems?'' :The following threat communities are examples of the human malicious threat landscape many organizations face: :*Internal :** Employees :** Contractors (and vendors) :** Partners :*External :** Cyber-criminals (professional hackers) :** Spies :**Non-professional hackers :** Activists :** Nation-state intelligence services (e.g., counterparts to the CIA, etc.) :** Malware (virus/worm/etc.) authors


Threat action

Threat action is an assault on system security.
A complete
security architecture Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thre ...
deals with both intentional acts (i.e. attacks) and accidental events. Various kinds of threat actions are defined as subentries under "threat consequence".


Threat analysis

Threat analysis is the analysis of the probability of occurrences and consequences of damaging actions to a system. It is the basis of
risk analysis In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environ ...
.


Threat modeling

Threat modeling is a process that helps organizations identify and prioritize potential threats to their systems. It involves analyzing the system's architecture, identifying potential threats, and prioritizing them based on their impact and likelihood. By using threat modeling, organizations can develop a proactive approach to security and prioritize their resources to address the most significant risks.


Threat intelligence

Threat intelligence is the practice of collecting and analyzing information about potential and current threats to an organization. This information can include indicators of compromise, attack techniques, and threat actor profiles. By using threat intelligence, organizations can develop a better understanding of the threat landscape and improve their ability to detect and respond to threats.


Threat consequence

Threat consequence is a security violation that results from a threat action.
Includes disclosure, deception, disruption, and usurpation. The following subentries describe four kinds of threat consequences, and also list and describe the kinds of threat actions that cause each consequence. Threat actions that are accidental events are marked by "*". ;"Unauthorized disclosure" (a threat consequence) : A circumstance or event whereby an entity gains access to data for which the entity is not authorized. (See: data confidentiality.). The following threat actions can cause unauthorized disclosure: :;" Exposure": :: A threat action whereby sensitive data is directly released to an unauthorized entity. This includes: ::; "Deliberate Exposure" ::: Intentional release of sensitive data to an unauthorized entity. ::; "
Scavenging Scavengers are animals that consume dead organisms that have died from causes other than predation or have been killed by other predators. While scavenging generally refers to carnivores feeding on carrion, it is also a herbivorous feeding be ...
": ::: Searching through data residue in a system to gain unauthorized knowledge of sensitive data. ::; * "
Human error Human error is an action that has been done but that was "not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits".Senders, J.W. and Moray, N.P. (1991) Human Er ...
" :::Human action or inaction that unintentionally results in an entity gaining unauthorized knowledge of sensitive data. ::; * "Hardware/software error" ::: System failure that results in an entity gaining unauthorized knowledge of sensitive data. :;"
Interception In Ball game, ball-playing Competitive sport, competitive team sports, an interception or pick is a move by a player involving a pass of the ball—whether by foot or hand, depending on the rules of the sport—in which the ball is intended for ...
": :: A threat action whereby an unauthorized entity directly accesses sensitive data travelling between authorized sources and destinations. This includes: ::; "
Theft Theft (, cognate to ) is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shor ...
": Gaining access to sensitive data by stealing a shipment of a physical medium, such as a magnetic tape or disk, that holds the data. ::; "Wiretapping (passive)": Monitoring and recording data that is flowing between two points in a communication system. (See:
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
.) ::; "Emanations analysis": Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data. :; "
Inference Inferences are steps in logical reasoning, moving from premises to logical consequences; etymologically, the word '' infer'' means to "carry forward". Inference is theoretically traditionally divided into deduction and induction, a distinct ...
": A threat action whereby an unauthorized entity indirectly accesses sensitive data (but not necessarily the data contained in the communication) by reasoning from characteristics or byproducts of communications. This includes: ::; "
Traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
": Gaining knowledge of data by observing the characteristics of communications that carry the data. ::; "Signals analysis": Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data. :; "
Intrusion In geology, an igneous intrusion (or intrusive body or simply intrusion) is a body of intrusive igneous rock that forms by crystallization of magma slowly cooling below the surface of the Earth. Intrusions have a wide variety of forms and com ...
": A threat action whereby an unauthorized entity gains access to sensitive data by circumventing a system's security protections. This includes: ::; "
Trespass Trespass is an area of tort law broadly divided into three groups: trespass to the person (see below), trespass to chattels, and trespass to land. Trespass to the person historically involved six separate trespasses: threats, assault, battery ...
": Gaining unauthorized physical access to sensitive data by circumventing a system's protections. ::; "Penetration": Gaining unauthorized logical access to sensitive data by circumventing a system's protections. ::; "
Reverse engineering Reverse engineering (also known as backwards engineering or back engineering) is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accompl ...
": Acquiring sensitive data by disassembling and analyzing the design of a system component. ::; "
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
": Transforming encrypted data into plain text without having prior knowledge of encryption parameters or processes. ;"
Deception Deception is the act of convincing of one or many recipients of untrue information. The person creating the deception knows it to be false while the receiver of the information does not. It is often done for personal gain or advantage. Tort of ...
" (a threat consequence): : A circumstance or event that may result in an authorized entity receiving false data and believing it to be true. The following threat actions can cause deception: :; "Masquerade": A threat action whereby an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity. ::;"Spoof": Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. ::; "Malicious logic": In context of masquerade, any hardware, firmware, or software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic. :; " Falsification": A threat action whereby false data deceives an authorized entity. (See: active wiretapping.) ::; "
Substitution Substitution may refer to: Arts and media *Substitution (poetry), a variation in poetic scansion * Substitution (theatre), an acting methodology Music *Chord substitution, swapping one chord for a related one within a chord progression *Tritone ...
": Altering or replacing valid data with false data that serves to deceive an authorized entity. ::; "
Insertion Insertion may refer to: *Insertion (anatomy), the point of a tendon or ligament onto the skeleton or other part of the body *Insertion (genetics), the addition of DNA into a genetic sequence *Insertion, several meanings in medicine, see ICD-10-PCS ...
": Introducing false data that serves to deceive an authorized entity. :; "Repudiation": A threat action whereby an entity deceives another by falsely denying responsibility for an act. ::; "False denial of origin": Action whereby the originator of data denies responsibility for its generation. ::;"False denial of receipt": Action whereby the recipient of data denies receiving and possessing the data. ; " Disruption" (a threat consequence): : A circumstance or event that interrupts or prevents the correct operation of system services and functions. (See:
denial of service In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
.) The following threat actions can cause disruption: :; " Incapacitation": A threat action that prevents or interrupts system operation by disabling a system component. ::; "Malicious logic": In the context of incapacitation, any hardware, firmware, or software (e.g., logic bomb) intentionally introduced into a system to destroy system functions or resources. ::; "Physical destruction": Deliberate destruction of a system component to interrupt or prevent system operation. ::; * "Human error": Action or inaction that unintentionally disables a system component. ::; * "Hardware or software error": Error that causes failure of a system component and leads to disruption of system operation. ::; * "Natural disaster": Any natural disaster (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component. :; "
Corruption Corruption is a form of dishonesty or a criminal offense that is undertaken by a person or an organization that is entrusted in a position of authority to acquire illicit benefits or abuse power for one's gain. Corruption may involve activities ...
": A threat action that undesirably alters system operation by adversely modifying system functions or data. ::; " Tamper": In the context of corruption, deliberate alteration of a system's logic, data, or control information to interrupt or prevent correct operation of system functions. ::; "Malicious logic": In the context of corruption, any hardware, firmware, or software (e.g., a computer virus) intentionally introduced into a system to modify system functions or data. ::; * "Human error": Human action or inaction that unintentionally results in the alteration of system functions or data. ::; * "Hardware or software error": Error that results in the alteration of system functions or data. ::; * "Natural disaster": Any natural event (e.g. power surge caused by lightning) that alters system functions or data. :; "
Obstruction Obstruction may refer to: Places * Obstruction Island, in Washington state * Obstruction Islands, east of New Guinea Medicine * Obstructive jaundice * Obstructive sleep apnea * Airway obstruction, a respiratory problem ** Recurrent airway obst ...
": A threat action that interrupts delivery of system services by hindering system operations. ::; "
Interference Interference is the act of interfering, invading, or poaching. Interference may also refer to: Communications * Interference (communication), anything which alters, modifies, or disrupts a message * Adjacent-channel interference, caused by extra ...
": Disruption of system operations by blocking communications or user data or control information. ::; " Overload": Hindrance of system operation by placing excess burden on the performance capabilities of a system component. (See:
flooding A flood is an overflow of water ( or rarely other fluids) that submerges land that is usually dry. In the sense of "flowing water", the word may also be applied to the inflow of the tide. Floods are of significant concern in agriculture, civi ...
.) ; "
Usurpation A usurper is an illegitimate or controversial claimant to power, often but not always in a monarchy. In other words, one who takes the power of a country, city, or established region for oneself, without any formal or legal right to claim it a ...
" (a threat consequence) : A circumstance or event that results in the control of system services or functions by an unauthorized entity. The following threat actions can cause usurpation: :; "
Misappropriation In law, misappropriation is the unauthorized use of another's name, likeness, identity, property, discoveries, inventions, etc. without that person's permission, resulting in harm to that person. Another use of the word refers to intentional a ...
": A threat action whereby an entity assumes unauthorized logical or physical control of a system resource. ::; "Theft of service": Unauthorized use of service by an entity. ::; "Theft of functionality": Unauthorized acquisition of actual hardware, software, or firmware of a system component. ::; "Theft of data": Unauthorized acquisition and use of data. :; "
Misuse Abuse is the act of improper usage or treatment of a person or thing, often to unfairly or improperly gain benefit. Abuse can come in many forms, such as: physical or verbal maltreatment, injury, assault, violation, rape, unjust practices, ...
": A threat action that causes a system component to perform a function or service that is detrimental to system security. ::; " Tamper": In the context of misuse, deliberate alteration of a system's logic, data, or control information to cause the system to perform unauthorized functions or services. ::; "Malicious logic": In the context of misuse, any hardware, software, or firmware intentionally introduced into a system to perform or control the execution of an unauthorized function or service. ::;" Violation of permissions": Action by an entity that exceeds the entity's system privileges by executing an unauthorized function.


Threat landscape or environment

A collection of threats in a particular domain or context, with information on identified vulnerable assets, threats, risks, threat actors and observed trends.


Threat management

Threats should be managed by operating an ISMS, performing all the
IT risk management IT risk management is the application of risk management methods to information technology in order to manage IT risk. Various methodologies exist to manage IT risks, each involving specific processes and steps. An IT risk management system ...
activities foreseen by laws, standards and methodologies. Very large organizations tend to adopt
business continuity management Business continuity may be defined as "the capability of an organization to continue the delivery of products or services at pre-defined acceptable levels following a disruptive incident", and business continuity planning (or business continuity ...
plans in order to protect, maintain and recover business-critical processes and systems. Some of these plans are implemented by computer security incident response team (CSIRT). Threat management must identify, evaluate, and categorize threats. There are two primary methods of
threat assessment Threat assessment is the practice of determining the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality. Threat assessment is separate to the more established practice of violence-r ...
: *
Information security audit An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of i ...
*
Penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
Many organizations perform only a subset of these methods, adopting countermeasures based on a non-systematic approach, resulting in ''computer insecurity''. Information
security awareness Security awareness is the knowledge and Risk attitude (security), attitude members of an organization possess regarding the protection of the physical, and especially Information Security Awareness, informational, assets of that organization. How ...
is a significant market. There has been a lot of software developed to deal with IT threats, including both
open-source software Open-source software (OSS) is Software, computer software that is released under a Open-source license, license in which the copyright holder grants users the rights to use, study, change, and Software distribution, distribute the software an ...
and
proprietary software Proprietary software is computer software, software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing t ...
.


Cyber threat management

Threat management involves a wide variety of threats including physical threats like flood and fire. While ISMS risk assessment process does incorporate threat management for cyber threats such as remote buffer overflows the risk assessment process doesn't include processes such as threat intelligence management or response procedures. Cyber threat management (CTM) is emerging as the best practice for managing cyber threats beyond the basic risk assessment found in ISMS. It enables early identification of threats, data-driven situational awareness, accurate decision-making, and timely threat mitigating actions. CTM includes: * Manual and automated intelligence gathering and threat analytics * Comprehensive methodology for real-time monitoring including advanced techniques such as behavioural modelling * Use of advanced analytics to optimize intelligence, generate security intelligence, and provide Situational Awareness * Technology and skilled people leveraging situational awareness to enable rapid decisions and automated or manual actions


Threat hunting

Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to traditional threat management measures, such as firewalls,
intrusion detection system An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
s, and
SIEM Security information and event management (SIEM) is a field within computer security that combines security information management (SIM) and security event management (SEM) to enable real-time analysis of security alerts generated by applications an ...
s, which typically involve an investigation ''after'' there has been a warning of a potential threat, or an incident has occurred. Threat hunting can be a manual process, in which a security analyst sifts through various data information using their knowledge and familiarity with the network to create hypotheses about potential threats. To be even more effective and efficient, however, threat hunting can be partially automated, or machine-assisted, as well. In this case, the analyst utilizes software that harnesses
machine learning Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
and user and entity behaviour analytics (UEBA) to inform the analyst of potential risks. The analyst then investigates these potential risks, tracking suspicious behaviour in the network. Thus hunting is an iterative process, meaning that it must be continuously carried out in a loop, beginning with a hypothesis. There are three types of hypotheses: * Analytics-driven: "Machine-learning and UEBA, used to develop aggregated risk scores that can also serve as hunting hypotheses" * Situational-awareness driven: "Crown Jewel analysis, enterprise risk assessments, company- or employee-level trends" * Intelligence-driven: "Threat intelligence reports, threat intelligence feeds, malware analysis, vulnerability scans" The analyst researches their hypothesis by going through vast amounts of data about the network. The results are then stored so that they can be used to improve the automated portion of the detection system and to serve as a foundation for future hypotheses. The
SANS Institute The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for tr ...
has conducted research and surveys on the effectiveness of threat hunting to track and disrupt cyber adversaries as early in their process as possible. According to a survey performed in 2019, "61% f the respondentsreport at least an 11% measurable improvement in their overall security posture" and 23.6% of the respondents have experienced a 'significant improvement' in reducing the dwell time.


Threat Mitigation

To protect yourself from computer threats, it's essential to keep your software up-to-date, use strong and unique passwords, and be cautious when clicking on links or downloading attachments. Additionally, using antivirus software and regularly backing up your data can help mitigate the impact of a threat.


See also

*
Cyber threat hunting In information security, threat hunting is the process of proactively searching for threats against computer systems in order to protect them. This is in contrast to traditional threat management measures, such as firewalls, intrusion detection s ...
* , i.e. societal threats *
Internet Engineering Task Force The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
(IETF) *
Information security audit An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of i ...
*
Information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
*
Intrusion detection system An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
*
IT risk It or IT may refer to: * It (pronoun), in English * Information technology Arts and media Film and television * ''It'' (1927 film), a film starring Clara Bow * '' It! The Terror from Beyond Space'', a 1958 science fiction film * ''It!'' (1967 ...
*
Physical security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
*
Vulnerability management Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be ...


References


External links


Term in FISMApediaCyber Threat Management Framework
{{DEFAULTSORT:Threat (computer security) Computer security exploits Security compliance