0% found this document useful (0 votes)
16 views9 pages

Fundamentals of Cyber Security

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views9 pages

Fundamentals of Cyber Security

Uploaded by

sushainkapoorsk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

5/30/24, 9:09 PM Resilience & Security Measures

1.Overview
Security professionals play a crucial role in protecting their organizations in today's complex threat
landscape. They are responsible for protecting the confidentiality, integrity, and availability of
information and information systems used by their organizations. Fulfilling this responsibility requires
a strong understanding of the threat environment facing their organization and a commitment to
designing and implementing a set of controls capable of rising to the occasion and answering those
threats. Security professionals must balance the need to protect sensitive data with the necessity of
enabling business operations. This requires a deep understanding of both technology and the
specific needs of the organization. Effective security professionals stay current with evolving threats,
continuously update their skills, and adapt their strategies to address new vulnerabilities and attack
vectors.

2. Key Concepts and Practices


A. Confidentiality, Integrity, and Availability (CIA Triad)

Confidentiality: Ensures that unauthorized individuals are not able to gain access to
sensitive information. Cybersecurity professionals develop and implement security controls,
including firewalls, access control lists, and encryption, to prevent unauthorized access to
information.

Example 1: A company implements encryption for all sensitive data stored on its servers.
When an attacker breaches the server, the encrypted data remains unreadable without the
decryption key, protecting its confidentiality. The encryption process involves using
algorithms to transform readable data into an unreadable format, ensuring that only
authorized users with the correct decryption key can access the information. When data is
encrypted, it is converted into ciphertext, which appears as a random string of characters.
Only those with the appropriate key can decrypt the ciphertext back into its original, readable
form.
Example 2: An organization deploys an access control system that restricts access to
sensitive files based on user roles. Only employees with the necessary permissions can
view or modify these files, preventing unauthorized access. This system works by defining
roles and permissions for each user, ensuring that only those with the appropriate
authorization can access sensitive information. Access control lists are used to specify
which users or groups have access to certain resources, and role-based access control
ensures that users only have access to what is necessary for their job functions.

Integrity: Ensures that there are no unauthorized modifications to information or systems,


either intentionally or unintentionally. Integrity controls, such as hashing and integrity monitoring
solutions, seek to enforce this requirement.

Example 1: A company uses hashing algorithms to create unique fingerprints for files. When
a file is accessed or modified, its hash value is recalculated and compared to the original. If
the values differ, it indicates that the file has been tampered with, ensuring its integrity. This
process involves generating a fixed-length string from the file's content, which changes if any
part of the file is altered. Hashing algorithms like SHA-256 produce a unique hash for every

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 1/9
5/30/24, 9:09 PM Resilience & Security Measures

different input, so even a small change in the file will result in a significantly different hash
value.
Example 2: An organization deploys an integrity monitoring solution that continuously scans
critical system files for changes. If any unauthorized modifications are detected, an alert is
generated, allowing administrators to investigate and restore the original state. This solution
works by periodically checking the integrity of system files against known baselines and
flagging any deviations. Integrity monitoring tools maintain a database of known good states
for critical files and compare current states to detect any unauthorized changes.

Availability: Ensures that information and systems are ready to meet the needs of legitimate
users at the time those users request them. Availability controls, such as fault tolerance,
clustering, and backups, seek to ensure that legitimate users may gain access as needed.

Example 1: A company implements a failover clustering system for its critical applications.
If one server fails, another server in the cluster takes over, ensuring continuous availability
of the application. This system involves setting up multiple servers to work together, with
one server automatically taking over if another fails, minimizing downtime. Clustering
software monitors the health of servers and manages failover processes to ensure
seamless service
continuity.
Example 2: An organization regularly backs up its data to a remote location. In case of a
hardware failure or cyber attack, the data can be quickly restored from the backup,
ensuring availability. This backup process involves copying data to a secure offsite location
at regular intervals, allowing for quick recovery in case of data loss. Automated backup
solutions can schedule regular backups, verify the integrity of backup data, and facilitate
rapid restoration when needed.

B. Security Control Types

Preventive Controls: Designed to prevent security incidents from occurring by


blocking unauthorized access and other harmful actions.

Example 1: Firewalls are configured to block incoming traffic from untrusted networks,
preventing unauthorized access to internal systems. The firewall rules specify which traffic
is allowed or denied, based on criteria such as IP addresses and ports. Firewalls inspect
incoming and outgoing network traffic and apply preconfigured rules to block or allow
specific traffic. This helps to prevent unauthorized access and mitigate threats such as
malware and hackers.
Example 2: Multifactor authentication (MFA) requires users to provide two or more
verification factors to gain access, significantly reducing the risk of unauthorized access. MFA
combines something the user knows (password), something the user has (security token), and
something the user is (biometric verification). This layered security approach ensures that
even if one factor is compromised, additional factors still protect the account.

Detective Controls: Designed to identify and detect security incidents promptly, enabling
timely response.

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 2/9
5/30/24, 9:09 PM Resilience & Security Measures

Example 1: Intrusion detection systems (IDS) monitor network traffic for suspicious activity
and generate alerts when potential security breaches are detected. IDS systems analyze
traffic patterns and compare them to known attack signatures. An IDS can be network-
based, monitoring traffic on a specific segment, or host-based, monitoring activity on
individual
systems. Alerts generated by IDS systems can be investigated to determine if a real threat
exists and take appropriate actions.
Example 2: Security information and event management (SIEM) systems aggregate and
analyze log data from various sources to detect anomalies and potential security incidents.
SIEM systems use correlation rules to identify patterns that may indicate a security breach,
allowing for quick investigation and response. By collecting and analyzing logs from multiple
devices, SIEM tools can provide a comprehensive view of an organization's security posture
and help identify coordinated attacks.

Corrective Controls: Designed to respond to and fix security incidents after they have
occurred, minimizing damage and restoring normal operations.

Example 1: An incident response team is activated when a data breach is detected,


following predefined procedures to contain and remediate the breach. The team
investigates the
incident, removes the threat, and implements measures to prevent recurrence. This process
includes identifying the breach source, containing the breach to prevent further damage,
eradicating the threat from affected systems, and recovering data and systems to restore
normal operations.
Example 2: A disaster recovery plan is executed following a major system failure, restoring
data and services from backups to ensure business continuity. This plan involves predefined
steps for recovering from various types of disasters, ensuring that critical systems are
restored as quickly as possible. Disaster recovery plans typically include steps for data
restoration, system recovery, and verification to ensure that systems are functioning correctly
after the
recovery process.

Deterrent Controls: Designed to discourage individuals from attempting unauthorized actions


by increasing the perceived risk of detection and punishment.

Example 1: Visible security cameras are installed in sensitive areas to deter theft and
unauthorized access. The presence of cameras acts as a deterrent by increasing the
likelihood of detection and identification. Security cameras can be positioned to cover entry
points, critical areas, and sensitive assets, and their footage can be monitored in real-time or
reviewed as needed.
Example 2: Warning banners are displayed on login screens, notifying users that
unauthorized access is prohibited and will be prosecuted. These banners serve as a
reminder of the legal consequences of unauthorized actions, deterring potential attackers.
Banners typically include statements about monitoring, potential penalties for unauthorized
access, and legal
ramifications, reinforcing the security policies in place.

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 3/9
5/30/24, 9:09 PM Resilience & Security Measures
C. Risk Management

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 4/9
5/30/24, 9:09 PM Resilience & Security Measures

Risk Identification: The process of identifying and documenting potential risks that could affect
the organization's assets and operations.

Example 1: A company conducts a risk assessment to identify potential threats to its IT


infrastructure, such as cyber attacks, hardware failures, and natural disasters. The
assessment involves analyzing the likelihood and impact of each threat, allowing the
company to prioritize its risk mitigation efforts. This process includes identifying critical
assets, potential threats, and vulnerabilities, and documenting the results to create a
comprehensive risk
profile.
Example 2: An organization reviews its business processes to identify areas where
sensitive data is handled and assess the risks associated with data breaches. This review
helps the
organization understand where its most significant risks lie and develop strategies to mitigate
them. The process involves mapping data flows, identifying points of vulnerability, and
evaluating the potential impact of data breaches on business operations and reputation.

Risk Assessment: The process of evaluating the identified risks to determine their potential
impact and likelihood.

Example 1: A financial institution evaluates the risk of a cyber attack on its online
banking platform, considering factors such as the potential financial loss and the
likelihood of an
attack occurring. This assessment helps the institution allocate resources to protect its most
critical assets. The risk assessment process includes quantifying potential losses,
estimating the likelihood of different threat scenarios, and prioritizing risks based on their
severity.
Example 2: A healthcare provider assesses the risk of data breaches involving patient
records, considering the potential impact on patient privacy and the likelihood of a breach.
This assessment guides the provider in implementing appropriate security measures to
protect patient data. The assessment includes evaluating the sensitivity of patient
information, identifying potential threat actors, and determining the effectiveness of existing
security
controls.

Risk Mitigation: The process of implementing controls to reduce the likelihood and impact of
identified risks.

Example 1: A company implements network segmentation to limit the spread of malware


in case of a security breach. By dividing the network into smaller, isolated segments, the
company reduces the risk of widespread infection. Network segmentation involves
configuring firewalls and access controls to restrict communication between segments,
ensuring that a breach in one segment does not affect others.
Example 2: An organization deploys endpoint protection software on all its devices to detect
and prevent malware infections. This software continuously monitors the devices for signs
of malicious activity and takes action to prevent infections. Endpoint protection solutions
often include antivirus, anti-malware, and behavior analysis capabilities to detect and block
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 5/9
5/30/24, 9:09 PM Resilience & Security Measures
threats in real-time.

Risk Acceptance: The decision to accept the risk without implementing additional controls,
typically because the cost of mitigation exceeds the potential impact.

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 6/9
5/30/24, 9:09 PM Resilience & Security Measures

Example 1: A small business accepts the risk of a minor data breach because the cost of
implementing advanced security controls is higher than the potential impact of the breach.
This decision is based on a thorough risk assessment and cost-benefit analysis. The
business documents the accepted risk and periodically reviews it to ensure it remains within
acceptable limits.
Example 2: An organization decides to accept the risk of downtime during routine
maintenance because the impact is minimal and the cost of implementing redundant
systems is prohibitive. This decision is documented in the organization's risk management
plan. The
organization implements measures to minimize downtime, such as scheduling maintenance
during off-peak hours and notifying users in advance.

D. Security Policies and Procedures

Security Policies: High-level statements of management intent regarding the protection


of information and information systems.

Example 1: A company establishes a security policy that mandates the use of strong
passwords for all user accounts. The policy outlines the minimum requirements for
password length, complexity, and expiration. The policy is communicated to all employees,
and compliance is enforced through regular audits and automated checks.
Example 2: An organization implements a data protection policy that requires all sensitive
data to be encrypted both in transit and at rest. The policy specifies the encryption
standards to be used and the responsibilities of employees in protecting data. The policy is
supported by technical controls, such as encryption software and secure communication
protocols, to ensure compliance.

Security Procedures: Detailed, step-by-step instructions for implementing security policies and
performing security-related tasks.

Example 1: A company develops a procedure for responding to security incidents,


outlining the steps to be taken from detection to resolution. The procedure includes
guidelines for incident reporting, investigation, and communication with stakeholders. The
procedure is tested regularly through simulations and drills to ensure that the incident
response team is prepared to handle real incidents.
Example 2: An organization creates a procedure for conducting regular vulnerability scans,
detailing the tools to be used, the systems to be scanned, and the process for reviewing
and addressing scan results. This procedure ensures that vulnerability management is
performed consistently and effectively. The procedure includes scheduling regular scans,
analyzing scan results, and prioritizing remediation efforts based on the severity of
identified vulnerabilities.

Security Standards: Specific requirements for implementing security controls,


ensuring consistency and compliance across the organization.

Example 1: A company adopts security standards for configuring its servers, specifying
settings for operating systems, applications, and network services to ensure they are
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 7/9
5/30/24, 9:09 PM Resilience & Security Measures
secure. These standards are based on industry best practices and regulatory
requirements. The

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 8/9
5/30/24, 9:09 PM Resilience & Security Measures

standards are documented and communicated to all IT staff, and compliance is verified
through regular audits and configuration checks.
Example 2: An organization implements a standard for the secure development of
software, requiring developers to follow secure coding practices and conduct code
reviews. This standard helps prevent vulnerabilities from being introduced during the
development
process. The standard includes guidelines for input validation, error handling, and secure
communication, as well as requirements for regular security testing and code reviews.

Security Guidelines: Recommendations and best practices for achieving security


objectives, offering flexibility in implementation.

Example 1: A company provides guidelines for securing mobile devices, recommending the
use of mobile device management (MDM) solutions and the enforcement of security policies
such as screen locks and remote wipe capabilities. These guidelines help employees
understand how to protect their devices and data. The guidelines include recommendations
for using strong passwords, enabling encryption, and regularly updating device software.
Example 2: An organization offers guidelines for safe internet usage, advising employees
on how to recognize phishing emails, avoid suspicious websites, and use secure
connections.
These guidelines aim to raise awareness and promote safe online behavior among
employees. The guidelines are communicated through regular training sessions and
awareness campaigns, helping employees recognize and avoid common cyber threats.

Understanding these key concepts and practices is essential for security professionals to effectively
protect their organizations from the diverse and evolving threats in today's cybersecurity landscape. By
implementing robust security controls, managing risks, and establishing comprehensive policies and
procedures, security professionals can ensure the confidentiality, integrity, and availability of their
organization's information and systems.

https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 9/9

You might also like