Week 1 - Introduction to cybersecurity and information sec

Cards (35)

  • Cyber security
    Measures to protect the confidentiality, integrity and availability of systems and data
  • Cyber security
    Prevention of damage to electronic communications systems and services, wire communication, and electronic communication to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation
  • Information security
    The protection of information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability
  • Cyber security vs Information security
    • Information Security focuses on protecting information assets, Cyber Security focuses on protecting computer systems, networks and the information stored in them or transmitted electronically
  • In IFB240 we will discuss both cyber security and information security, as they have common fundamental concepts
  • Types of assets that need protection
    • Information assets
    • Physical assets (buildings, hardware, software, networking)
    • People
    • Procedures
    • Non-tangible assets (reputation)
  • Confidentiality
    Assurance that information is not disclosed to unauthorised individuals, processes, or devices
  • Integrity
    Assurance that data has been created, amended or deleted only by authorised individuals
  • Availability
    Assurance that resources are accessible and usable when required by an authorised user
  • Authentication

    • Entity authentication - verifying a claimed identity
    • Data origin authentication - verifying the source and integrity of a received message
  • Non-repudiation
    Creating evidence that an action has occurred, so the user cannot falsely deny the action later
  • Information security is not the same as IT security, as information is stored, transmitted, processed and displayed in many different ways, not just in IT systems
  • Information security is not the same as confidentiality, as confidentiality is just one aspect of information security
  • Security is not always just about confidentiality, it can also be about protecting the integrity and availability of information and systems
  • Threats
    Sets of circumstances with the potential to cause harm by compromising stated security goals
  • Vulnerabilities
    Characteristics of, or weaknesses in a system that could be used to cause harm if acted on by a threat
  • Threats and vulnerabilities coincide
    An incident occurs
  • Security incident
    An unwanted or unexpected cyber security event, or a series of such events, that have a significant probability of compromising business operations
  • Attack
    A security incident where the vulnerabilities are deliberately exploited
  • Attacker
    Also called threat actor, malicious actor or adversary
  • Personal example: laptop
    • Threat - Theft of computing assets (laptop)
    • Vulnerability - Poor physical security of site containing asset, e.g. unlocked window
    • Security incident or attack - Burglary (Burglar exploits vulnerability to steal asset)
  • Workplace example: customer information
    • Threat - Unauthorised disclosure of customer personal information
    • Vulnerability - Disposal or re-use of storage media without proper erasure
    • Security incident or attack - Persons without authorisation may access data files on storage media
  • Serious security incidents can result from non-deliberate acts, so they must also be considered in cyber security assessments
  • Information states

    In storage, in transmission, being processed (in use)
  • Controls
    Security measures or countermeasures used to protect information assets or business goals by countering threats or reducing vulnerabilities
  • Types of controls
    • Preventive
    • Detective
    • Corrective
  • The traditional 3 information security goals are confidentiality, integrity, and availability
  • Security is about protecting assets from damage or harm, and information is an essential asset that needs to be protected
  • Corporate information
    Names and addresses of employees, clients/customers, suppliers, Financial details for employees, clients/customers, suppliers, Details of upcoming promotions, Tenders for upcoming contracts, System configuration & processes, Product development information, Trade secrets, Transaction records
  • Cyber crime
    Electronic crime where information & comms technology is the target or used as tools to enable an offence
  • Ransomware
    • Malware that encrypts users computer files, attackers then demand a payment to permit decryption
  • Remote control of vehicles

    • Accessing a Jeep Cherokee wirelessly to control speed, braking, wipers, climate, sound
  • Security controls
    • Preventive, Detective, Corrective
  • McCumber cube
    Framework for discussing Information Security
  • Security is about protecting assets from damage or harm. Information is an essential asset and it needs to be protected.