Current threat models and attack vectors on KVIN

Office Data gives you office 365 database with full contact details. If you like to buy the office database then you can discuss it here.
Post Reply
Rakhirandiseo
Posts: 398
Joined: Tue Dec 03, 2024 10:15 am

Current threat models and attack vectors on KVIN

Post by Rakhirandiseo »

According to Denis Sukhovey, the owner of this information and the corresponding production processes bears responsibility for the security of KVIN and possible damage incurred as a result of the implementation of threats. "In most cases, it is quite difficult to determine who is responsible. This is dictated by the fact that organizations most often have end-to-end processes, and areas of responsibility are blurred during the development and changes of the organization," he noted.

“In the context of increasingly frequent use of IT and information security according to the service model,” reminds Vyacheslav Logushev, “it is important for heads of information security services to agree on the necessary guarantees of COVID-19 security from the providers of the services used.”

According to Alexey Dankov, current attack vectors and estonia whatsapp data to the security of KVIN should be discussed in the context of the architecture of information systems, KVIN processing processes, and the technologies used for this. The most vulnerable, in his opinion, are technologies that are widely distributed, highly accessible (for example, open source products), as well as new ones, the development of which is just beginning, which means there is no history of their successful use.

The current threat model, agrees Sergey Samoilov, is developed in the company by information security specialists in relation to specific information and automated systems. "The periodically revised models should take into account possible technical channels of information leakage, identified vulnerabilities of information and automated systems (for example, based on the system of links and designations of vulnerabilities and errors CVE and the repository of vulnerabilities NVD), patterns of computer attacks (they can be created based on the enumeration and classification of CAPEC attack patterns), as well as possible sequences (combinations) of typical attacks (based on the knowledge base of tactics, techniques and generally known knowledge about intruders MITRE ATT@CK, etc.)," ​​he believes.

“The main threat from COVID-19 in the overwhelming majority of cases is unauthorized access by an attacker to information and, as a result, the illegal use of this information,” Denis Sukhovey is sure.
Post Reply