Preview

Failure Mode And Effects Analysis

Good Essays
Open Document
Open Document
910 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Failure Mode And Effects Analysis
FMEA and its benefits with regards to CIA

Failure Mode and Effects Analysis is a systematic and proactive technique for evaluating a process to identify where and how it might fail and to assess the relative impact of different failures, in order to identify the parts of the process that are most in need of change. FMEA analysis each item in a system, considers each possible way in which the respective item can fail, determines how each failure will affect system operation, and utilizes the results of the analysis to eliminate the root causes of failures or at least alleviate their effects.

The technique was developed and first used by reliability engineers to study problems that might arise from malfunctions of military systems during the
…show more content…
Related to computers, malicious software intentionally attacks software systems to: 1) cause an unintended effect; 2) prevent an intended effect; 3) or do both. Software designers use threat modeling to better understand and repulse threats to their systems. Threat modeling provides a framework for understanding potential security threats to a system, determining risk, and establishing appropriate mitigations. As the number of threads has increased, today we have a variety of threat models, but there is no universal standard method for modelling threats to software systems. The existing models usually follow the next steps:

- software and system familiarization;

- develop rules and assumptions;

- describe threats;

- classify threats;

- identify
…show more content…
The most important procedure of a threat effects analysis is to develop a system to classify and group together similar threats. There is no universal taxonomy of malicious security threats at the moment, but some useful ones have been developed. Probably the most popular taxonomy is CIA, which addresses the three key requirements in any computer-related system: confidentiality, integrity, and availability. There are several threat classification strategies that use CIA to classify the threats into groups.

Confidentiality threats attempt to obtain resources of a system that are intended to be accessed only by authorized parties. The goal of a confidentiality threat is for unauthorized entity to access secret or private information from a system. Confidentiality threats have been divided in 3 subclasses:

- Eavesdropping – refers to a system in which the privacy is invaded by an attacker that spies on a user of a system or the system to gather information about the user or about the intercommunication between the user and the system;

- Theft – refers to when the attacker also steals the information from the user or system and use it for personal

You May Also Find These Documents Helpful

  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Likelihood of Occurrence: This will measure the likelihood a failure mode is to occur. The score range will be 1-10 with 1 meaning it is very unlikely to occur and 10 meaning very likely to occur.…

    • 2877 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    IS3110 U1L1

    • 1084 Words
    • 5 Pages

    Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC571 tips

    • 460 Words
    • 2 Pages

    Phase I – Identify potential weaknesses from either the Aircraft Solutions or Quality Web Design Company…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.3: Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy partially intersects security, including for instance the concepts of appropriate use, as well as protection, of information.…

    • 2293 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Root Cause Analysis

    • 1501 Words
    • 7 Pages

    cause is identified, a plan of action will be established, and a failure mode and effects analysis…

    • 1501 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    The CISO is the executive responsible for the organization's entire security posture, both physical and digital. CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Bibliography: Kim, David and Michael G. Solomon. “Fundamentals of Information Systems Security.”, 15-42. Sunbury, MA: jones and Bartlett Learning, 2012.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays