Key Cybersecurity and Information Security Concepts
Key Cybersecurity and Information Security Concepts
Threat
• Threat: A harmful event or action that can cause damage to an organization's
assets, data, or operations.
o Types of Damage:
▪ Confidentiality: Unauthorized disclosure of sensitive
information.
▪ Integrity: Alteration or manipulation of data, leading to loss of
trust in the system.
▪ Availability: Disruption of system or service availability,
rendering them inaccessible when needed.
o Sources of Threats:
▪ Human-Made: Malicious insiders, hackers, cybercriminals, or
negligent employees.
▪ Non-Human-Made: Technical issues (e.g., malware, hardware
failure) or natural disasters (e.g., floods, fires).
Asset
• Asset: Any resource owned by an organization that provides economic or
strategic value.
o Types of Assets:
▪ Tangible Assets: Physical items like buildings, servers, and
hardware.
▪ Intangible Assets: Non-physical items like intellectual property
(patents, trademarks), strategic plans, trade secrets, and
reputation.
Page 1 of 4
www.cyvitrix.com [email protected]
Linkedin Youtube
Vulnerability
• Vulnerability: A weakness or flaw in a system, application, network, or
human behavior that can be exploited by a threat actor.
o Types of Vulnerabilities:
▪ Technical Vulnerabilities: Unpatched software, open ports, or
outdated security protocols.
▪ Non-Technical Vulnerabilities: Lack of security awareness or
inadequate security training for employees.
Managing Vulnerabilities
Page 2 of 4
www.cyvitrix.com [email protected]
Linkedin Youtube
Zero-Day Vulnerabilities
• Definition: Vulnerabilities that are actively exploited by threat actors but
have no available patch or fix, making them particularly dangerous.
o Impact: Zero-day vulnerabilities are highly effective in attacks due to
the lack of prior awareness or defenses against them.
o Mitigation: Employing proactive security measures such as prompt
patching, layered security defenses, and network segmentation to
limit the impact.
Recap
• An attack results from the combination of a threat, a motivated threat actor,
and an exploitable vulnerability.
• Continuous monitoring and a holistic security approach are essential for
maintaining a mature and effective security posture.
• Security is an ongoing process that requires multiple layers of protection,
continuous improvement, and constant vigilance to adapt to evolving threats.
Page 4 of 4
www.cyvitrix.com [email protected]