0% found this document useful (0 votes)
32 views23 pages

Cybersecurity: Cybersecurity Concepts CSUSM Cybersecurity Education Hub

Cybersecurity involves protecting computer systems, hardware, software, data, and other digital assets from harm. This includes protecting the confidentiality, integrity, and availability of these assets. Key concepts in cybersecurity are vulnerabilities, threats, risk, and controls. Vulnerabilities are weaknesses that could be exploited by threats like hackers or malware to cause harm such as data theft, system disruption, or reputational damage. Risk is the likelihood and impact of such harm occurring. Controls are measures used to reduce vulnerabilities and the likelihood or impact of threats.

Uploaded by

sudheerthota1225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views23 pages

Cybersecurity: Cybersecurity Concepts CSUSM Cybersecurity Education Hub

Cybersecurity involves protecting computer systems, hardware, software, data, and other digital assets from harm. This includes protecting the confidentiality, integrity, and availability of these assets. Key concepts in cybersecurity are vulnerabilities, threats, risk, and controls. Vulnerabilities are weaknesses that could be exploited by threats like hackers or malware to cause harm such as data theft, system disruption, or reputational damage. Risk is the likelihood and impact of such harm occurring. Controls are measures used to reduce vulnerabilities and the likelihood or impact of threats.

Uploaded by

sudheerthota1225
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Cybersecurity

Cybersecurity Concepts

CSUSM Cybersecurity Education Hub


Cybersecurity Fundamentals

▪ What is cybersecurity?
▪ What are we trying to protect?
▪ Risk – threats, vulnerabilities, likelihood
▪ Confidentiality, integrity, and availability (C-I-A) concepts
▪ What kinds of harm are we trying to avoid?
▪ How can we avoid that harm?

CSUSM Cybersecurity Education Hub 2


What Is Computer Cyber Security?

▪ The protection of the assets of a computer system


▪ Hardware
▪ Software
▪ Data

CSUSM Cybersecurity Education Hub 3


Assets Are…

Hardware Software/Network Data


• Computers but also: • Operating systems, • Files, photos, music,
• Medical devices applications but also databases but also:
• Automobiles • Access control • Location
• Industrial controllers mechanisms • Actions
• Security systems • Physical Access • Network identity
• Household appliances • Location services • Access list
• Scientific equipment • Network traffic • Payment info
• Tracking/location • Actions • Response/Status
devices • Device identity • Monitored activity
• …and more • …and more • …and more

CSUSM Cybersecurity Education Hub 4


Basic Terms

• Vulnerability – weakness in a system


• Threat – circumstance with potential to cause harm
• Attack – exploit of a vulnerability
• Countermeasure or control – action or device that removes or
reduces a vulnerability

CSUSM Cybersecurity Education Hub 5


C-I-A Triad

▪ Confidentiality - Only persons authorized to access information or systems


should get access to the information or system.
▪ Integrity - Only those persons or applications authorized to alter the system or
information may do so, and alterations are made under controlled
circumstances.
▪ Availability - The information or system, along with the applications, and other
hosts used to access, store and manipulate it, is available when needed.
▪ Sometimes two other desirable characteristics:
▪ Authentication – Confirm identity of a sender/signer.
▪ Nonrepudiation – Confirm that asserted action can’t be denied.

CSUSM Cybersecurity Education Hub 6


Confidentiality

▪ Both actual data and information


about data
▪ Access to all of it or part of it?
▪ Unauthorized – both persons and
processes or systems
▪ Generally means viewing/obtaining
but not modifying

CSUSM Cybersecurity Education Hub 7


Confidentiality

Personal Data and Information


• Credit card account numbers and bank account numbers
• Social security numbers and address information

Intellectual Property
• Copyrights, patents, and secret formulas
• Source code, customer databases, and technical specifications

National Security
• Military intelligence
• Homeland security and government-related information

CSUSM Cybersecurity Education Hub 8


Integrity

▪ Maintain valid, precise ▪ User names


uncorrupted, and accurate and passwords
information.
▪ Word “not” macro
▪ Pentium math error ▪ Patents and copyrights

CSUSM Cybersecurity Education Hub


▪ Errors ▪ Source code
▪ Purposeful changes to values
(accounting, salary)
▪ Alterations are authorized and ▪ Diplomatic information
intentional ▪ Financial data

9
Availability

• Complex series of topics


• Moves far into operations
• Backups and recovery?
• Disk availability – raid, mirroring, cloud services?
• Personnel and training?
• Business Continuity/Disaster Recovery?
• Uptime and “normal” failures?
CSUSM Cybersecurity Education Hub 10
Harm

▪ Negative consequence of the attack


▪ Dependency on value of asset
▪ Theft (identity/financial/intellectual property)
▪ Loss of privacy
▪ Loss (destruction) of asset
▪ Organizational operations impact
▪ Reputational harm

CSUSM Cybersecurity Education Hub 11


Risk

▪ Potential of harm (loss) …. From failure/attack of an information system


▪ Likely threats - Fire? Earthquake? Theft? Social engineering? Malware?
▪ Countermeasures
▪ Risk transfer
▪ Value of asset, amount of harm, cost of countermeasure(s)
▪ Problem:
▪ Difficult to assess value
▪ Difficult to assess impact (amount of harm)
▪ Difficult to identify threats
▪ Difficult to assess “likelihood” of threat

CSUSM Cybersecurity Education Hub 12


Threat and Vulnerability
Countermeasure/
Vulnerability Control

Threat

13
CSUSM Cybersecurity Education Hub
Vulnerability

▪ Vulnerability - Weakness that can allow harm to occur


▪ Jargon: “Attack surface” – the full set of a system’s vulnerabilities
▪ Common vulnerabilities
▪ Untrained users
▪ Employee sabotage
▪ Poor authentication implementation
▪ Poor configuration
▪ Lack of physical security
▪ Failure to adequately isolate network traffic
▪ … etc

CSUSM Cybersecurity Education Hub 14


Threats

▪ There are many ways to classify threats


▪ Nonhuman threats: natural disasters, hardware failures, etc.
▪ Human threats: spilling a soft drink, entering the wrong data by
mistake, intentionally hacking a system
▪ Malicious vs. non-malicious
▪ Random vs. directed

CSUSM Cybersecurity Education Hub 15


Harm From Human Threats

▪ Interception – Someone accessed something to which they had


not been granted access
▪ Interruption - Something became unavailable or unusable
▪ Modification - Someone changed something they weren’t
supposed to
▪ Fabrication - Someone created fake data or records

CSUSM Cybersecurity Education Hub 16


Risk and Likelihood

▪ What's the chance of being invaded by hostile aliens?


▪ Really, really small?
▪ Likelihood is the chance that a threat will happen
▪ Effect of being invaded by hostile aliens?
▪ Death, destruction…
▪ Impact is the damage that could occur
▪ Humans overestimate the likelihood of rare and high-impact events, perhaps
underestimate the likelihood of more common, potentially less impactful events. Ex: air
travel vs auto travel

CSUSM Cybersecurity Education Hub 17


Affecting Likelihood:
Method, Opportunity, Motive

▪ As with traditional crime, a computer attacker must have three things:

• Skills and tools to perform the


Method attack

• Time and access to


Opportunity accomplish the attack

• A reason to perform the


Motive attack
CSUSM Cybersecurity Education Hub 18
Controls/Countermeasures

▪ Defn: “Means to counter a threat”


▪ Detective – identify when a threat is/has acting(ed) on the vulnerability
▪ System monitoring
▪ Security alarm system
▪ Preventive – keep the threat away from acting on the vulnerability
▪ Actual prevention – physical, environmental, firewall, encryption
▪ Deterrence – Policies/procedures, training, anti-malware
▪ Corrective – lessen the impact of the threat
▪ Backup/recovery
▪ Disaster recovery systems

CSUSM Cybersecurity Education Hub 19


Controls

▪ Prevent
▪ Remove the vulnerability from the system
▪ Deter
▪ Make the attack harder to execute
▪ Deflect
▪ Make another target more attractive (perhaps a decoy)
▪ Detect
▪ Discover that the attack happened, immediately or later
▪ Recover
▪ Recover from the effects of the attack

CSUSM Cybersecurity Education Hub 20


Physical Controls

▪ Locks on doors
▪ Security guards
▪ Backup copies of data
▪ Planning for natural disasters and fires
▪ Simple controls are often the best
▪ Attackers will always look for a weak point in your defenses

CSUSM Cybersecurity Education Hub 21


Technical Controls

• Development controls
▪ Software controls:
• Quality control for creating
▪ Passwords
software so that vulnerabilities
▪ OS and application controls are not introduced

▪ Encryption, access control • Hardware controls


methods • Smart cards on satellite or cable
television set-top boxes
▪ Independent control programs
• Fingerprint or other biometric
▪ Application programs that readers
protect against specific
• Network
vulnerabilities
CSUSM Cybersecurity Education Hub
• Firewalls, 22
Procedural Controls

▪ Humans…
▪ Policies, procedures, standards
▪ Most important: training and awareness
▪ Policy examples:
▪ Password composition
▪ Prohibitions on sharing
▪ Confidentiality agreements

▪ Legal protections
▪ State/Fed laws
▪ Common law

CSUSM Cybersecurity Education Hub 23

You might also like