Lesson 2 - CyberSecurity Fundamentals
Lesson 2 - CyberSecurity Fundamentals
Cybersecurity Fundamentals
Learning Objectives
A set of technologies used for protecting systems, networks, and programs from digital
attacks, damage, and unauthorized access.
Unauthorized
Attack Access
Address Damage
Threats
Why Cybersecurity?
Presence of crime
syndicates
Presence of cyber
Increased demand armies
to protect data
Presence of
Increased rate financial frauds
of cyber crime
Refers to processes and tools designed to Is a set of techniques used to protect the integrity
protect sensitive information of networks, programs, and data
Governance, Risk Management, and Compliance of every organization is different and varies based on the
type of organization.
Regulations Size
Mission
Culture Industry
Responsibility of GRC
The ultimate responsibility of the GRC program is to protect their assets and operations IT, including their
infrastructure and information.
GRC
Governance
Provides strategic direction
Risk Management
Ensures that the objectives are achieved
Risk Management
Compliance
GRC
Risk Management
Compliance
Roles of Cybersecurity
Cybersecurity Roles
The success of a cybersecurity role is ultimately the responsibility of the board of directors.
Security
Board of Directors Management
Executive Cybersecurity
Committee Practitioners
Approaches to Cybersecurity
Inherent risk
Residual risk
Illustration: Basics of Cybersecurity
Threat Actors, Attacks, and Mitigation
Threat Actor
A threat actor or malicious actor is a person or entity that is responsible for an event or incident that
impacts or has the potential to impact the safety or security of another entity.
Threat Actor Categories
Hactivist Insiders
Threat Actor
categories are:
Natural
Supply system Man-made Sociopolitical
environmental
threats threats threats
threats
Malware
Worms Rootkit
Viruses Backdoor
Spyware Ransomware
Adware
Worms
Trojans are programs that claim to perform one function but does another, typically
malicious.
Spyware
Rootkits are designed to modify the operating systems’ operations to facilitate non-standard functionality.
Backdoor
Logic bombs infect a system and lie dormant until they are triggered by a specific condition.
Ransomware
Ransomware attempts to extort money from the user by infecting and taking control of a victim's machine.
Malware Attacks
Ghost Mirai
Denial-of-Service Attack
They refer to a type of malicious behavior designed to target the top layer in the OSI model.
Application Layer Attacks
Static Testing
Dynamic Testing
In March 2018, hackers hit Saks Fifth Avenue and Lord & Taylor, stealing debit and credit cards.
In May 2018, the concert and sporting event ticketing website, ticketfly was vandalized,
taken down, and disrupted for a week.
Security Attacks
In August 2018, Russian hackers made millions selling credit card details stolen from almost
245,000 British Airways customers.
Social Engineering
It is the art of manipulating people, so they give up their confidential information violating
the security principle.
Social Engineering Attack Categories
Spear Phishing
In 2017, Ethereum Classic website was hacked resulting in the loss of thousands of dollars in
cryptocurrency.
Social Engineering Attack: Ethereum Classic
End Users
● Is a long-term plan
● Defines security posture
● Is valid for five years and is
renewed annually
● Helps understand security
functions
● Helps in risk assessment
Types of Security Management Plan
● Is a mid-term plan
● Provides detailed goals
● Is updated every year or two
● Is technology oriented
Types of Security Management Plan
● Is a short-term plan
● Is highly detailed
● Is updated monthly or
quarterly
● Spells out how to accomplish
goals
Security Policy
• Is a strategic plan
Organizational
policy
Issue-specific System-specific
policy policy
Focuses on individual
Focuses on a specific service,
systems
department, or function
Security Policy Framework
Standard
Procedure
● Is system specific
Baseline ● Establishes the common
secure state
Security Policy Framework
Standard
● Offers recommendations on
Procedure
implementation
Baseline
Security Policy Framework
Standard
Baseline
Security Policy Framework
● Is a tactical document
Procedure
Guideline
Baseline
Due Care and Due Diligence
Data is reliable
Countermeasure
It is an action or method that is applied to prevent, avert, or reduce potential threats to:
These are procedures and policies used to define employee actions toward sensitive information.
Technical Controls
Detective
Deterrent Corrective
Preventive Recovery Compensating
Defense in Depth or Layered Approach
It is the act of using multiple layers of security controls to protect the integrity of information.
Defense in Depth or Layered Approach
Personnel Procedural
Technical Physical
Defense in Depth or Layered Approach
Identity Management
It enables the right users to access the right resources at the right time for the right reasons.
IAM Components
Authentication Authorization
The components of
IAM are:
Identification Authentication
Biometric Location
Multi-Factor Authentication
Reviewing
Interviewing staff applications and OS
access controls
Analyzing physical
Performing security
access to the
vulnerability scans
systems
Monitoring
It involves acquiring, testing, and installing multiple patches to an administered computer system.
Patch Management Tasks
Technology
Systems
applications
Infrastructure Firmware
System Hardening: Purpose
It eliminates security risks and secures a system by reducing its attack surface.
System Hardening Activities
Use encryption
Possible
Formal RFC Implementation
rollback
4 Support
Data Management
It is an administrative process to ensure the accessibility, reliability, and timeliness of the data for its users.
Storing data
Protecting data
Validating data
They describe the different modes whereby data is used by a computing equipment.
Three Basic States of Data
Acquisition: Indexed
system data
Use: Challenges in
protection
Information Lifecycle
The non-existence of
back doors
Symmetric encryption is based on the same key or private key to encrypt plain text
and decrypt ciphertext.
• Uses one key to encrypt and • Shares the key with the
decrypt receiver
• Uses less processing power
Symmetric Encryption
Services of cryptography:
It is the process of exposing people to security issues so that they may be able to recognize
them and better respond to them.
Key Takeaways
Strategic plan, tactical plan, and operational plan are the types of
security management plans.