User's Manual
INTRODUCTION
CYBERSECURITY
KleeYa - User Manual - Version 2 1-21
Type of threat source Description Examples
ADVERSE
• Individual
• Outsider
• Insider
• Trusted insider
• Privileged insider
• Group
• Ad hoc
• Established
• Organization
• Nation-State
Individuals, groups, organizations, or
states that seek to exploit the
organization’s dependence on cyber
resources (i.e., information in
electronic form, information and
communications technologies, and
the communications and
information-handling capabilities
provided by those technologies).
1. Obtaining unauthorized access to
sensitive system files based on
known system vulnerabilities.
2. Malware, like a virus or worm
could take down servers and
could transmit data to a
computer criminal. This could
cause unexpected negative
behavior of the KleeYa System.
3. Corruption of data and files on
the KleeYa System leading to an
unexpected behavior and
malfunctioning of the system.
ACCIDENTIAL
• User
• Lab Administrator
• Field Service Engineer
Erroneous actions taken by
individuals in the course of
executing their everyday
responsibilities.
1. Revelation of classified data
2. Entry of erroneous data
3. Accidental data deletion or
modification
a. The file is deleted or moved to
another location.
b. The file are changed or
deleted in such a way causing
the system to use wrong data.
4. Data storage in unprotected
areas
5. Failure to protect information
STRUCTURAL
• IT Equipment
• Storage
• Processing
• Communications
• Display
• Sensor
• Controller
• Environmental Controls
• Temperature/Humidity
Controls
• Power Supply
• Software
• Operating System
• Networking
• General-Purpose
Application
• Mission-Specific
Application
Failure: equipment, environmental
controls, or software due to
aging,resource depletion, or other
circumstances which exceed
expected operating parameters.
1. Uncontrolled installation or
update of software can lead to
unexpected behavior or
malfunctioning of the KleeYa
System.