Conduit Devices

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
1. Similar to the human element, conduit devices within the organization play a significant role due to the data it produces or utilises. These devices are either used as an intermediary to proceed with the attack or attacked to take over their Command and Control capabilities.
Types of Cyber Security Threats from 'Conduit Devices'

Examples of conduit devices cyber security threats:
Click to know more about expert level training

(Source: Business Continuity Management Institute - BCM Institute)

 

A Manager’s Guide to Business Continuity Management for Cybersecurity Incident Response

2. Devices play a significant role in data breaches as assets targeted either for the data they store/process or because of their accessibility to the outside world. We often see devices used as tools to advance an attack, as well as device ownership and management often appearing as a factor in data breaches.
Source: (Verizon, 2016)

3. As with humans, devices also play a substantial role in data breaches. Vulnerable devices can be targeted because of the data they store or process and are often used by threat actors as Command and Control (C2) platforms or pass-through intermediaries. Conduit devices consist of networking equipment, servers, desktops, laptops, tablets, smartphones and portable storage devices. This represents an unending list of devices to protect and monitor.
Source: (Verizon, 2017)