Fundamentals of Cyber Security
Fundamentals of Cyber Security
1.Overview
Security professionals play a crucial role in protecting their organizations in today's complex threat
landscape. They are responsible for protecting the confidentiality, integrity, and availability of
information and information systems used by their organizations. Fulfilling this responsibility requires
a strong understanding of the threat environment facing their organization and a commitment to
designing and implementing a set of controls capable of rising to the occasion and answering those
threats. Security professionals must balance the need to protect sensitive data with the necessity of
enabling business operations. This requires a deep understanding of both technology and the
specific needs of the organization. Effective security professionals stay current with evolving threats,
continuously update their skills, and adapt their strategies to address new vulnerabilities and attack
vectors.
Confidentiality: Ensures that unauthorized individuals are not able to gain access to
sensitive information. Cybersecurity professionals develop and implement security controls,
including firewalls, access control lists, and encryption, to prevent unauthorized access to
information.
Example 1: A company implements encryption for all sensitive data stored on its servers.
When an attacker breaches the server, the encrypted data remains unreadable without the
decryption key, protecting its confidentiality. The encryption process involves using
algorithms to transform readable data into an unreadable format, ensuring that only
authorized users with the correct decryption key can access the information. When data is
encrypted, it is converted into ciphertext, which appears as a random string of characters.
Only those with the appropriate key can decrypt the ciphertext back into its original, readable
form.
Example 2: An organization deploys an access control system that restricts access to
sensitive files based on user roles. Only employees with the necessary permissions can
view or modify these files, preventing unauthorized access. This system works by defining
roles and permissions for each user, ensuring that only those with the appropriate
authorization can access sensitive information. Access control lists are used to specify
which users or groups have access to certain resources, and role-based access control
ensures that users only have access to what is necessary for their job functions.
Example 1: A company uses hashing algorithms to create unique fingerprints for files. When
a file is accessed or modified, its hash value is recalculated and compared to the original. If
the values differ, it indicates that the file has been tampered with, ensuring its integrity. This
process involves generating a fixed-length string from the file's content, which changes if any
part of the file is altered. Hashing algorithms like SHA-256 produce a unique hash for every
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 1/9
5/30/24, 9:09 PM Resilience & Security Measures
different input, so even a small change in the file will result in a significantly different hash
value.
Example 2: An organization deploys an integrity monitoring solution that continuously scans
critical system files for changes. If any unauthorized modifications are detected, an alert is
generated, allowing administrators to investigate and restore the original state. This solution
works by periodically checking the integrity of system files against known baselines and
flagging any deviations. Integrity monitoring tools maintain a database of known good states
for critical files and compare current states to detect any unauthorized changes.
Availability: Ensures that information and systems are ready to meet the needs of legitimate
users at the time those users request them. Availability controls, such as fault tolerance,
clustering, and backups, seek to ensure that legitimate users may gain access as needed.
Example 1: A company implements a failover clustering system for its critical applications.
If one server fails, another server in the cluster takes over, ensuring continuous availability
of the application. This system involves setting up multiple servers to work together, with
one server automatically taking over if another fails, minimizing downtime. Clustering
software monitors the health of servers and manages failover processes to ensure
seamless service
continuity.
Example 2: An organization regularly backs up its data to a remote location. In case of a
hardware failure or cyber attack, the data can be quickly restored from the backup,
ensuring availability. This backup process involves copying data to a secure offsite location
at regular intervals, allowing for quick recovery in case of data loss. Automated backup
solutions can schedule regular backups, verify the integrity of backup data, and facilitate
rapid restoration when needed.
Example 1: Firewalls are configured to block incoming traffic from untrusted networks,
preventing unauthorized access to internal systems. The firewall rules specify which traffic
is allowed or denied, based on criteria such as IP addresses and ports. Firewalls inspect
incoming and outgoing network traffic and apply preconfigured rules to block or allow
specific traffic. This helps to prevent unauthorized access and mitigate threats such as
malware and hackers.
Example 2: Multifactor authentication (MFA) requires users to provide two or more
verification factors to gain access, significantly reducing the risk of unauthorized access. MFA
combines something the user knows (password), something the user has (security token), and
something the user is (biometric verification). This layered security approach ensures that
even if one factor is compromised, additional factors still protect the account.
Detective Controls: Designed to identify and detect security incidents promptly, enabling
timely response.
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 2/9
5/30/24, 9:09 PM Resilience & Security Measures
Example 1: Intrusion detection systems (IDS) monitor network traffic for suspicious activity
and generate alerts when potential security breaches are detected. IDS systems analyze
traffic patterns and compare them to known attack signatures. An IDS can be network-
based, monitoring traffic on a specific segment, or host-based, monitoring activity on
individual
systems. Alerts generated by IDS systems can be investigated to determine if a real threat
exists and take appropriate actions.
Example 2: Security information and event management (SIEM) systems aggregate and
analyze log data from various sources to detect anomalies and potential security incidents.
SIEM systems use correlation rules to identify patterns that may indicate a security breach,
allowing for quick investigation and response. By collecting and analyzing logs from multiple
devices, SIEM tools can provide a comprehensive view of an organization's security posture
and help identify coordinated attacks.
Corrective Controls: Designed to respond to and fix security incidents after they have
occurred, minimizing damage and restoring normal operations.
Example 1: Visible security cameras are installed in sensitive areas to deter theft and
unauthorized access. The presence of cameras acts as a deterrent by increasing the
likelihood of detection and identification. Security cameras can be positioned to cover entry
points, critical areas, and sensitive assets, and their footage can be monitored in real-time or
reviewed as needed.
Example 2: Warning banners are displayed on login screens, notifying users that
unauthorized access is prohibited and will be prosecuted. These banners serve as a
reminder of the legal consequences of unauthorized actions, deterring potential attackers.
Banners typically include statements about monitoring, potential penalties for unauthorized
access, and legal
ramifications, reinforcing the security policies in place.
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 3/9
5/30/24, 9:09 PM Resilience & Security Measures
C. Risk Management
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 4/9
5/30/24, 9:09 PM Resilience & Security Measures
Risk Identification: The process of identifying and documenting potential risks that could affect
the organization's assets and operations.
Risk Assessment: The process of evaluating the identified risks to determine their potential
impact and likelihood.
Example 1: A financial institution evaluates the risk of a cyber attack on its online
banking platform, considering factors such as the potential financial loss and the
likelihood of an
attack occurring. This assessment helps the institution allocate resources to protect its most
critical assets. The risk assessment process includes quantifying potential losses,
estimating the likelihood of different threat scenarios, and prioritizing risks based on their
severity.
Example 2: A healthcare provider assesses the risk of data breaches involving patient
records, considering the potential impact on patient privacy and the likelihood of a breach.
This assessment guides the provider in implementing appropriate security measures to
protect patient data. The assessment includes evaluating the sensitivity of patient
information, identifying potential threat actors, and determining the effectiveness of existing
security
controls.
Risk Mitigation: The process of implementing controls to reduce the likelihood and impact of
identified risks.
Risk Acceptance: The decision to accept the risk without implementing additional controls,
typically because the cost of mitigation exceeds the potential impact.
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 6/9
5/30/24, 9:09 PM Resilience & Security Measures
Example 1: A small business accepts the risk of a minor data breach because the cost of
implementing advanced security controls is higher than the potential impact of the breach.
This decision is based on a thorough risk assessment and cost-benefit analysis. The
business documents the accepted risk and periodically reviews it to ensure it remains within
acceptable limits.
Example 2: An organization decides to accept the risk of downtime during routine
maintenance because the impact is minimal and the cost of implementing redundant
systems is prohibitive. This decision is documented in the organization's risk management
plan. The
organization implements measures to minimize downtime, such as scheduling maintenance
during off-peak hours and notifying users in advance.
Example 1: A company establishes a security policy that mandates the use of strong
passwords for all user accounts. The policy outlines the minimum requirements for
password length, complexity, and expiration. The policy is communicated to all employees,
and compliance is enforced through regular audits and automated checks.
Example 2: An organization implements a data protection policy that requires all sensitive
data to be encrypted both in transit and at rest. The policy specifies the encryption
standards to be used and the responsibilities of employees in protecting data. The policy is
supported by technical controls, such as encryption software and secure communication
protocols, to ensure compliance.
Security Procedures: Detailed, step-by-step instructions for implementing security policies and
performing security-related tasks.
Example 1: A company adopts security standards for configuring its servers, specifying
settings for operating systems, applications, and network services to ensure they are
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 7/9
5/30/24, 9:09 PM Resilience & Security Measures
secure. These standards are based on industry best practices and regulatory
requirements. The
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 8/9
5/30/24, 9:09 PM Resilience & Security Measures
standards are documented and communicated to all IT staff, and compliance is verified
through regular audits and configuration checks.
Example 2: An organization implements a standard for the secure development of
software, requiring developers to follow secure coding practices and conduct code
reviews. This standard helps prevent vulnerabilities from being introduced during the
development
process. The standard includes guidelines for input validation, error handling, and secure
communication, as well as requirements for regular security testing and code reviews.
Example 1: A company provides guidelines for securing mobile devices, recommending the
use of mobile device management (MDM) solutions and the enforcement of security policies
such as screen locks and remote wipe capabilities. These guidelines help employees
understand how to protect their devices and data. The guidelines include recommendations
for using strong passwords, enabling encryption, and regularly updating device software.
Example 2: An organization offers guidelines for safe internet usage, advising employees
on how to recognize phishing emails, avoid suspicious websites, and use secure
connections.
These guidelines aim to raise awareness and promote safe online behavior among
employees. The guidelines are communicated through regular training sessions and
awareness campaigns, helping employees recognize and avoid common cyber threats.
Understanding these key concepts and practices is essential for security professionals to effectively
protect their organizations from the diverse and evolving threats in today's cybersecurity landscape. By
implementing robust security controls, managing risks, and establishing comprehensive policies and
procedures, security professionals can ensure the confidentiality, integrity, and availability of their
organization's information and systems.
https://chatgpt.com/c/abcdf691-a6d9-4021-bf1a-008ab5dd3b32 9/9