Threats
Examples
Advanced persistent threat
Backdoors
Bootkits
Computer crime
Viruses
Denial of service
Eavesdropping
Exploits
Keyloggers
Logic bombs
Malware
Payloads
Phising
Ransomware
Rootkits
Screen scrapers
Rootkits
Screen scrapers
Spyware
Trojans
Vulnerabilities
Web shells
Web application security
Worms
Response to threats
Possible responses to a security threat or risk can be:
Reduce/ mitigate - implement safeguards and countermeasures to eliminate vulnerabilities or block threats.
Assign/ transfer - place the cost of the threat onto another entity or organization such as purchasing insurance or outsourcing.
Accept - evaluate if the cost of the countermeasure outweighs the possible cost of loss due to the threat.
A parallel to Safety: SRAC - Safety Related Application Condition.
The concept of SRAC is defined on CENELEC EN50129 standard and it is the responsibility of RAMS/Safety Engineer to document and deliver to the user.
SRACs must be seen as a legal contract associated with the transfer of a device or an installation, with connotations related to safety.
Its importance requires robustness and its treatment must meet expectations regarding the implications that they entail.
SRACs clarify the safety responsibilities of the entities, in charge of the installation, maintenance and operation, that is, of the entire service cycle of the equipment or installation.
Last updated