Week 3 Notes
Week 3 Notes
Security controls:
CIA Triad:
The CIA (confidentiality, integrity, and availability) triad is a
foundational cybersecurity model that helps inform how organizations
consider risk when setting up systems and security policies.
Confidentiality:
Confidentiality means that only authorized users can access specific
assets or data. For example, strict access controls that define who should and
should not have access to data, must be put in place to ensure confidential
data remains safe.
Integrity:
Integrity means the data is correct, authentic, and reliable. To maintain
integrity, security professionals can use a form of data protection like
encryption to safeguard data from being tampered with.
Availability:
Availability means data is accessible to those who are authorized to
access it.
Asset:
An asset is an item perceived as having value to an organization. And
value is determined by the cost associated with the asset in question.
week 3 notes
In addition to the NIST CSF and NIST RMF, there are several other controls,
frameworks, and compliance standards that it is important for security
professionals to be familiar with to help keep organizations and the people
they serve safe.
GDPR is a European Union (E.U.) general data regulation that protects the
processing of E.U. residents’ data and their right to privacy in and out of E.U.
territory. For example, if an organization is not being transparent about the
data they are holding about an E.U. citizen and why they are holding that data,
this is an infringement that can result in a fine to the organization. Additionally,
if a breach occurs and an E.U. citizen’s data is compromised, they must be
informed. The affected organization has 72 hours to notify the E.U. citizen
about the breach.
1. Privacy
2. Security
3. Breach notification
Organizations that store patient data have a legal obligation to inform patients
of a breach because if patients' Protected Health Information (PHI) is
exposed, it can lead to identity theft and insurance fraud. PHI relates to the
past, present, or future physical or mental health or condition of an individual,
whether it’s a plan of care or payments for care. Along with understanding
HIPAA as a law, security professionals also need to be familiar with the Health
Information Trust Alliance (HITRUST®), which is a security framework and
assurance program that helps institutions meet HIPAA compliance.
week 3 notes
Associate
Supervisor
Manager
Executive
Vendor
Others
ETHICS IN CYBERSECURITY
Security Ethics:
Security ethics are guidelines for making appropriate decisions as a
security professional. As another example, if you as an analyst have the ability
to grant yourself access to payroll data and can give yourself a raise, just
because you have access to do so, does that mean you should? The answer
is no. You should never abuse the access you've been granted and entrusted
with.
Ethical Principle :
1. Confidentiality applied to ethics:
As a security professional, you'll encounter proprietary or private
information, such as PII. It's your ethical duty to keep that information confidential
and safe. For example, you may want to help out a coworker by providing
computer system access outside of properly documented channels. However,
this ethical violation can result in serious consequences, including reprimands,
the loss of your professional reputation, and legal repercussions for both you and
your friend.
2. Privacy Protection:
Privacy protection means safeguarding personal information from
unauthorized use. For example, imagine you receive a personal email after
hours from your manager requesting a colleague's home phone number.
Your manager explains that they can't access the employee database at the
moment, but they need to discuss an urgent matter with that person. As a
security analyst, your role is to follow the policies and procedures of your
company, which in this example, state that employee information is
stored in a secure database and should never be accessed or shared in
any other format. So, accessing and sharing the employee's personal
information would be unethical. In situations like this, it can be difficult to
know what to do. So, the best response is to adhere to the policies and
procedures set by your organization.
3. Law:
Laws are rules that are recognized by a community and enforced by a
governing entity.
***As you enter the security field, remember that technology is
constantly evolving, and so are attackers' tactics and
techniques. Because of this, security professionals must continue to
think critically about how to respond to attacks. Having a strong sense
of ethics can guide your decisions to ensure that the proper processes
week 3 notes
For these reasons, the only individuals in the U.S. who are allowed to
counterattack are approved employees of the federal government or military
personnel.
The International Court of Justice (ICJ), which updates its guidance regularly,
states that a person or group can counterattack if:
The counterattack will only affect the party that attacked first.
week 3 notes
To learn more about specific scenarios and ethical concerns from an international perspective,
review updates provided in the Tallinn Manual online.
Confidentiality means that only authorized users can access specific assets or
data. Confidentiality as it relates to professional ethics means that there needs
to be a high level of respect for privacy to safeguard private assets and data.
to protect your organization, its internal infrastructure, and the people involved
with the organization. To do this:
Ensure that you are consistently invested in the work you are doing, so
you can appropriately and ethically address issues that arise.
Stay informed and strive to advance your skills, so you can contribute to
the betterment of the cyber landscape.
Availability: The idea that data is accessible to those who are authorized to access it
Confidentiality: The idea that only authorized users can access specific assets or data
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients' health information
Integrity: The idea that the data is correct, authentic, and reliable
Privacy protection: The act of safeguarding personal information from unauthorized use
week 3 notes
Protected health information (PHI): Information that relates to the past, present, or future
physical or mental health or condition of an individual
Security frameworks: Guidelines used for building plans to help mitigate risk and threats to
data and privacy
Security governance: Practices that help support, define, and direct security efforts of an
organization
Sensitive personally identifiable information (SPII): A specific type of PII that falls under
stricter handling guidelines