Threats

Examples

  • Advanced persistent threat

  • Backdoors

  • Bootkits

  • Computer crime

  • Viruses

  • Denial of service

  • Eavesdropping

  • Exploits

  • Keyloggers

  • Logic bombs

  • Malware

  • Payloads

  • Phising

  • Ransomware

  • Rootkits

  • Screen scrapers

  • Rootkits

  • Screen scrapers

  • Spyware

  • Trojans

  • Vulnerabilities

  • Web shells

  • Web application security

  • Worms

Response to threats

Possible responses to a security threat or risk can be:

  • Reduce/ mitigate - implement safeguards and countermeasures to eliminate vulnerabilities or block threats.

  • Assign/ transfer - place the cost of the threat onto another entity or organization such as purchasing insurance or outsourcing.

  • Accept - evaluate if the cost of the countermeasure outweighs the possible cost of loss due to the threat.

A parallel to Safety: SRAC - Safety Related Application Condition.

  • The concept of SRAC is defined on CENELEC EN50129 standard and it is the responsibility of RAMS/Safety Engineer to document and deliver to the user.

  • SRACs must be seen as a legal contract associated with the transfer of a device or an installation, with connotations related to safety.

  • Its importance requires robustness and its treatment must meet expectations regarding the implications that they entail.

  • SRACs clarify the safety responsibilities of the entities, in charge of the installation, maintenance and operation, that is, of the entire service cycle of the equipment or installation.

Last updated