User's Manual

INTRODUCTION
CYBERSECURITY
KleeYa - User Manual - Version 2 1-21
Type of threat source Description Examples
ADVERSE
Individual
Outsider
Insider
Trusted insider
Privileged insider
Group
Ad hoc
Established
Organization
Nation-State
Individuals, groups, organizations, or
states that seek to exploit the
organization’s dependence on cyber
resources (i.e., information in
electronic form, information and
communications technologies, and
the communications and
information-handling capabilities
provided by those technologies).
1. Obtaining unauthorized access to
sensitive system files based on
known system vulnerabilities.
2. Malware, like a virus or worm
could take down servers and
could transmit data to a
computer criminal. This could
cause unexpected negative
behavior of the KleeYa System.
3. Corruption of data and files on
the KleeYa System leading to an
unexpected behavior and
malfunctioning of the system.
ACCIDENTIAL
User
Lab Administrator
Field Service Engineer
Erroneous actions taken by
individuals in the course of
executing their everyday
responsibilities.
1. Revelation of classified data
2. Entry of erroneous data
3. Accidental data deletion or
modification
a. The file is deleted or moved to
another location.
b. The file are changed or
deleted in such a way causing
the system to use wrong data.
4. Data storage in unprotected
areas
5. Failure to protect information
STRUCTURAL
IT Equipment
Storage
Processing
Communications
Display
Sensor
Controller
Environmental Controls
Temperature/Humidity
Controls
Power Supply
Software
Operating System
Networking
General-Purpose
Application
Mission-Specific
Application
Failure: equipment, environmental
controls, or software due to
aging,resource depletion, or other
circumstances which exceed
expected operating parameters.
1. Uncontrolled installation or
update of software can lead to
unexpected behavior or
malfunctioning of the KleeYa
System.