2020/2021 - Cybersecurity Governance
Yellow highlights = what appeared in the SPOC2 quiz.
1
, Module 1: Cybersecurity threat landscape
More dependent on digital infrastructure:
- Confidentiality
- Integrity
- Availability
We need digital networked systems to work properly. Security is important in this.
2 types of damage in information and information systems:
1. Accidents → e.g. computer system fails because of programming error
2. Intentional → e.g. hack. ⇒ focus of this module.
Attack is not performed by a computer, but by a person = the threat actor. Cause of the
threat. Has an objective.
- Many types of threat actors → distinguish between: insider, script kiddie,
hacktivist, state actor, criminal, terrorist. Each has their own goals e.g. sabotage,
espionage, information theft. They have their own target group, organisational form,
motives etc.
- Collective of threat actors = threat actor landscape
Studying the characteristics of an attack may point you to a type of actor.
→ E.g. Ransomware → usually applied by criminals for economic reasons.
→ Advanced attacks can indicate a state actor is behind it.
Malware
- Malicious + software
2