Difference between revisions of "Valuables"
(30 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | [[Category:Threat]] |
||
− | =Valuables= |
||
− | '''Valuables''' are assets (goods, information or people) that can represent a (high) value to criminals and can therefore attract crime. |
+ | [[File:i.png|25px|right|This is a help page for the SecuRbAn risk assessment tool]]'''Valuables''' are assets (goods, information or people) that can represent a (high) value to criminals and can therefore attract crime. |
==Valuable goods== |
==Valuable goods== |
||
− | [[File: |
+ | [[File:Brillanten.jpg|thumbnail|right|Diamonds, and example of easily tradeble goods]]Valuable goods are personal properties that represent a value to criminals. There are several types of personal property that are particularly relevant to consider as valuable goods: |
* Money or any other right on capital, including securities like bonds, stocks, investment funds, etc. |
* Money or any other right on capital, including securities like bonds, stocks, investment funds, etc. |
||
− | * Objects that can 'easily' (relative to the profit gained) be sold like cars, drugs, bicycles or mobiles |
+ | * Objects that can 'easily' (relative to the profit gained) be sold like jewellery, cars, drugs, bicycles or mobiles |
− | * Objects that are |
+ | * Objects that are particularly in demand (particularly rare objects, such as art, specialized machinery or objects which are associated with a high status) |
− | * Objects |
+ | * Objects which contain valuable materials that can be recycled (such as copper in wires or bronze in statues) |
==Valuable information== |
==Valuable information== |
||
− | Valuable information is information that, if [[Wikipedia:Information security|information security]] is breached, can be abused by criminals to gain wealth. This can be achieved by the following mechanisms: |
+ | [[File:creditcard.jpg|thumb|right|Creditcard information, an example of information used for identity fraud]]Valuable information is information that, if [[Wikipedia:Information security|information security]] is breached, can be abused by criminals to gain wealth. This can be achieved by the following mechanisms: |
* Extortion (threat of breach of confidentiality, integrity, availability, authenticity or non-repudiation of the information) |
* Extortion (threat of breach of confidentiality, integrity, availability, authenticity or non-repudiation of the information) |
||
* Sale of the information (breach of confidentiality) |
* Sale of the information (breach of confidentiality) |
||
Line 21: | Line 21: | ||
==Valuable persons== |
==Valuable persons== |
||
− | Valuable persons are people that, when security is breached, can be used by criminals to extort relations of the victim. This can be achieved by either abduction or hostage taking (for example of an organisation with an employee, or a family with a family member). Valuable persons can be identified by two qualities: |
+ | [[File:Freddy Heineken.jpg|thumb|right|Photograph of Freddy Heineken, who was kidnapped for ransom in 1983]]Valuable persons are people that, when security is breached, can be used by criminals to extort relations of the victim. This can be achieved by either abduction or hostage taking (for example of an organisation with an employee, or a family with a family member). Valuable persons can be identified by two qualities: |
* the high value they have to their relations; |
* the high value they have to their relations; |
||
* the resources available to (and likelihood of) those relations to submit to extortion, i.e. pay a ransom. |
* the resources available to (and likelihood of) those relations to submit to extortion, i.e. pay a ransom. |
||
{{references}} |
{{references}} |
||
− | |||
− | = MAP = |
||
− | |||
− | <websiteFrame> |
||
− | website=http://securipedia.eu/cool/index.php?wiki=securipedia.eu&concept=Valuables |
||
− | height=1023 |
||
− | width=100% |
||
− | border=0 |
||
− | scroll=auto |
||
− | align=middle |
||
− | </websiteFrame> |
||
− | |||
− | <headertabs/> |
Latest revision as of 15:40, 14 August 2013
Valuables are assets (goods, information or people) that can represent a (high) value to criminals and can therefore attract crime.
Valuable goods
Valuable goods are personal properties that represent a value to criminals. There are several types of personal property that are particularly relevant to consider as valuable goods:
- Money or any other right on capital, including securities like bonds, stocks, investment funds, etc.
- Objects that can 'easily' (relative to the profit gained) be sold like jewellery, cars, drugs, bicycles or mobiles
- Objects that are particularly in demand (particularly rare objects, such as art, specialized machinery or objects which are associated with a high status)
- Objects which contain valuable materials that can be recycled (such as copper in wires or bronze in statues)
Valuable information
Valuable information is information that, if information security is breached, can be abused by criminals to gain wealth. This can be achieved by the following mechanisms:
- Extortion (threat of breach of confidentiality, integrity, availability, authenticity or non-repudiation of the information)
- Sale of the information (breach of confidentiality)
- Theft of financial resources by identity fraud (breach of authenticity)
There are several types of property that are particularly relevant to consider as valuable information:
- Credentials, such as login codes, creditcard numbers, passports, ID cards, passwords, etcetera
- Sellable data, such as large address lists, commercial information, developments and patents, etcetera
- Any data the owner would be willing to pay for not to have disclosed
Valuable persons
Valuable persons are people that, when security is breached, can be used by criminals to extort relations of the victim. This can be achieved by either abduction or hostage taking (for example of an organisation with an employee, or a family with a family member). Valuable persons can be identified by two qualities:
- the high value they have to their relations;
- the resources available to (and likelihood of) those relations to submit to extortion, i.e. pay a ransom.
Footnotes and references