5 Pillars of Cybersecurity

What pillar is violated?

  1. Eve listens in on Alice and Bob's phone conversation without their permission.
    Confidentiality
  2. Eve pretends to be Alice, and convinces a bank teller to withdraw money from Alice's account.
    Authentication
  3. Eve steals Bob's Facebook password.
    Confidentiality
  4. Eve deletes her own web browser's history, which her employer disallowed by the policy.
    Non-repudition
  5. Eve cuts the power to Bob's data center, shutting down all of his systems.
    Availability
  6. Eve logs into Bob’s Facebook account without his permission.
    Authentication
  7. Eve sends a threatening letter to Alice, but later denies having sent it.
    Non-repudiation
  8. Eve defaces a website of a company she does not like.
    Integrity
  9. Eve sends an e-mail to Bob pretending to be Alice.
    Authentication
  10. Alice attempts to speak with Bob, but Eve yells over the top preventing both from hearing each other.
    Availability
  11. Eve later denies the fact that she contractually promised to replay Bob $500 before the first of the year.
    Non-repudiation
  12. Eve duplicates the entire content of Alice's Hard Disk Drive (HDD) while staying aboard in a hotel room.
    Confidentiality
  13. Bitcoin's Blockchain (a public ledger of transactions) records financial transfers. Alice has 1 BTC, but her private key was stolen by Eve.
    Confidentiality
  14. Alice and Bob write software for a satellite system. However, neither implemented proper algorithms to convert from English to metric measurements, and the $125M satellite was lost entering Mars orbit. (See a wiki page on this indicent).
    Integrity

A Model for Computer Security

We overview some terms used in computer security.

Security concepts and relations can be described as follows:

Types of Threats/Attacks

The following is based on https://www.csirt.gob.cl/eng/incident-classification-taxonomy/.