Cybersecurity: Cybersecurity Concepts CSUSM Cybersecurity Education Hub
Cybersecurity: Cybersecurity Concepts CSUSM Cybersecurity Education Hub
Cybersecurity Concepts
▪ What is cybersecurity?
▪ What are we trying to protect?
▪ Risk – threats, vulnerabilities, likelihood
▪ Confidentiality, integrity, and availability (C-I-A) concepts
▪ What kinds of harm are we trying to avoid?
▪ How can we avoid that harm?
Intellectual Property
• Copyrights, patents, and secret formulas
• Source code, customer databases, and technical specifications
National Security
• Military intelligence
• Homeland security and government-related information
9
Availability
Threat
13
CSUSM Cybersecurity Education Hub
Vulnerability
▪ Prevent
▪ Remove the vulnerability from the system
▪ Deter
▪ Make the attack harder to execute
▪ Deflect
▪ Make another target more attractive (perhaps a decoy)
▪ Detect
▪ Discover that the attack happened, immediately or later
▪ Recover
▪ Recover from the effects of the attack
▪ Locks on doors
▪ Security guards
▪ Backup copies of data
▪ Planning for natural disasters and fires
▪ Simple controls are often the best
▪ Attackers will always look for a weak point in your defenses
• Development controls
▪ Software controls:
• Quality control for creating
▪ Passwords
software so that vulnerabilities
▪ OS and application controls are not introduced
▪ Humans…
▪ Policies, procedures, standards
▪ Most important: training and awareness
▪ Policy examples:
▪ Password composition
▪ Prohibitions on sharing
▪ Confidentiality agreements
▪ Legal protections
▪ State/Fed laws
▪ Common law