Module 6 Cybersecurity Principles, Practices, and Processes
Module 6 Cybersecurity Principles, Practices, and Processes
2
6.1 The Three Dimensions
3
The Three Dimensions
4
The Three Dimensions
• Rights management covers both digital rights management (DRM) and information rights
management (IRM).
• DRM protects copyrighted material like music, films, or books.
• IRM is used with email and other files that are relevant to the activities and communications
of an organization.
5
The Three Dimensions
Data Integrity
• Integrity is the accuracy, consistency, and trustworthiness of data across its entire lifecycle.
• Data undergoes several operations, such as capture, storage, retrieval, update, and transfer.
• Data must remain unaltered by unauthorized entities during all these operations.
• Methods used to ensure data integrity include hashing, data validation checks, data consistency
checks, and access controls.
• Data integrity is a fundamental component of information security.
• The levels of need for data integrity are:
• Critical
• High
• Medium
• Low
6
The Three Dimensions
Ensuring Availability
There are many measures that organizations can implement to ensure the availability of their services
and systems.
• Operating systems and software updates and patches: Modern operating systems,
applications, and software are continuously updated to correct errors and eliminate vulnerabilities.
• Backup testing: Backup of organization data, configuration data, and personal data helps
ensures availability. Backup systems and backed up data should also be tested to ensure they
work properly, and that data can be recovered in the event of data loss.
7
The Three Dimensions
• Disaster planning: Planning for disasters is a critical part of increasing system availability. The
cybersecurity team should practice response protocols, test backup systems, and be familiar with
procedures for restoring critical systems.
• New technology implementations: High availability requires continuous evaluation and testing
of new technologies to counter new threats and attacks. Cybercriminals use the latest tools and
tricks, so cyber professionals are also required to keep up, using new technologies, products and
devices.
• Availability testing: All systems should be tested to find vulnerabilities. Testing can include port
scans, vulnerability scans, and penetration tests.
8
6.2 States of Data
9
States of Data
Data at Rest
• Data that is not in transit or in-process is considered data at rest.
• If you have data that you need to store and will want to access later, some storage options exist:
It uses multiple hard drives in an array, combining multiple disks so that the operating
Redundant array of independent system sees them as a single disk. RAID provides improved performance and fault
disks (RAID) tolerance.
It is connected to a network that allows storage and retrieval of data from a centralized
Network attached storage (NAS) location by authorized network users. NAS devices are flexible and scalable, meaning that
device their capacity can be increased as needed.
It is a network-based storage system. SAN systems connect to the network using high-
Storage area Network (SAN) speed interfaces, which allows for improved performance and the ability to connect
multiple servers to a centralized disk storage repository.
A remote storage that uses space on a data center provider and is accessible from any
Cloud Storage computer with Internet access, usually upon subscription.
10
States of Data
Direct-attached storage
• It can be one of the most difficult types of data storage to manage and control.
• It is vulnerable to malicious attacks on the local host.
Data at rest
• It also includes backup data (when it is not being written or in transit).
• To boost security and decrease data loss, organizations should limit the types of data stored on
direct-attached storage devices.
11
States of Data
• Data in transit is the data which is being transmitted, not at rest nor in use.
• Wired networks: It includes copper and fiber optic media and can serve a LAN or span
great distances in wide area networks (WAN).
• Wireless networks: It uses radio waves to transmit data. It increases the number of guest
users with mobile devices on small office home office (SOHO) and enterprise networks.
12
States of Data
• Packet refers to a unit of data that travels between a source and a destination on the network.
• Standard protocols such as the IP and HTTP define the structure and format of data packets.
• These standards are open source and fully available to the public.
• Protecting the confidentiality, integrity, and availability of transmitted data is one of the most
important responsibilities of a cybersecurity professional.
13
States of Data
• With the growth in mobile and wireless devices, and the increasing amounts of data collected and
stored by organizations, cybersecurity professionals have become responsible for protecting
massive amounts of data crossing their network daily.
Protecting the integrity of data in Cybersecurity professionals deploy data integrity systems that test the integrity and
transit authenticity of transmitted data to counter these actions. These systems include, for
example, hashing and data redundancy.
Protecting the availability of data in Network security professionals can implement mutual authentication systems to
transit counter these actions. Mutual authentication systems require the user to
authenticate to the server and requests the server to authenticate to the user.
14
States of Data
Data in Process
• Data in process refers to data during initial input, modification, computation, or output.
Input Protection of data integrity starts with the initial input of data. Organizations use several methods to collect
data, each posing a potential threat to data integrity: data entry, scanning forms, file uploads, and data
collected from sensors. Corruption during the input process may include mislabeling and incorrect or
mismatched data formats, data entry errors, or disconnected and/or malfunctioning or inoperable system
sensors.
Modification Data modification is any change made to original data, such as users manually modifying data, and programs
processing and changing data. These changes are intentional, but changes to data can be unintentional or
malicious. When data is modified in a way that stops it from being readable or usable, this is often referred to
as data corruption.
Output Data output refers to outputting data to output devices, such as printers, electronic displays and
speakers. The accuracy of output data is critical because output provides information and influences
decision-making.
15
States of Data
• Protecting data in process requires well-designed systems. Otherwise, the results for
organizations can be severe and costly to their finances or even their reputation.
16
6.3 Cybersecurity
Countermeasures
17
Cybersecurity Countermeasures
• Software safeguards include programs and services that protect operating systems, databases and
other services operating on workstations, portable devices and servers.
They control remote access to a system. Operating systems typically include a firewall, or
Software firewalls
a user can purchase or download software from a third party.
Network and port scanners They discover and monitor open ports on a host or server.
Devices that collect and examine network traffic. They identify problems
Protocol analyzers of performance and misbehaving applications, detect misconfigurations, establish baseline
and normal traffic patterns and debug communication problems.
Host-based intrusion They examine activity on host systems only. An IDS generates log files and alarm
detection systems (IDS) messages when it detects unusual activity.
18
Cybersecurity Countermeasures
Firewalls They block unwanted traffic. They contain customizable rules that define the traffic
allowed into and out of a network.
Proxy servers They use a network addressing scheme to present one organization-wide IP
address to the Internet. A proxy server thus functions on behalf of the client when
requesting service, potentially masking the true origin of the request to the
resource server.
Hardware-based access control Devices that utilize biometric technology, such as fingerprint or iris scanners, to
confirm the identity of anyone trying to access servers, data, and systems.
Network switches Switches are commonly used as a connection point, linking other devices together,
for example in a local area network. Their features enable them to add to the
security efficiency of the network.
19
Cybersecurity Countermeasures
• A security awareness program and solid, comprehensive security policies are extremely important
for any organization.
• An employee might not be purposefully malicious but just unaware of what the proper procedures
are and still cause great harm.
• There are several ways to implement training to prevent this and to ensure all employees feel
knowledgeable and confident to make cybersecurity best practices part of their day-to-day
activities.
20
Cybersecurity Countermeasures
21
Cybersecurity Countermeasures
Policies
• A security policy sets out the security objectives, rules of behavior and system requirements to be
adhered to.
• Security policies inform users, staff, and managers of the organization’s requirements, which
protect technology and information assets.
• A security policy also specifies the mechanisms needed to meet security requirements.
22
Cybersecurity Countermeasures
Policies (Cont.)
A security policy typically includes:
Identification and Specify authorized persons that can have access to network resources and outlines
authentication policies verification procedures for said users.
Password policies Ensure passwords meet minimum requirements and are changed regularly.
Identify network resources and usage that are acceptable to the organization. It may also
Acceptable use policies
identify ramifications for policy violations.
Remote access policies Identify how remote users can access a network and what is remotely accessible.
Network maintenance Specify network device operating systems and end-user application update procedures.
policies
• One of the most common security policy components is an acceptable use policy (AUP). This
component defines what users can and cannot do on the various system components.
23
Cybersecurity Countermeasures
Standards
• Standards help IT staff maintain consistency in operating the network.
• Security policies inform users, staff, and managers of the organization’s technology and
information asset protection requirements.
• Each organization develops standards that support its unique operating environment.
Guidelines
• Guidelines are a list of suggestions on how to do things more efficiently and securely.
• Guidelines define how standards are developed and guarantee adherence to general security
policies.
• In addition to an organization’s defined best practices, guidelines are also available from:
• National Institute of Standards and Technology (NIST) Computer Security Resource Center
• National Security Agency (NSA) Security Configuration Guides
• The Common Criteria standard
25
6.4 Cybersecurity Principles,
Practices, and Processes
Summary
26
SUMMARY
• Wired networks use cables to transmit data. They include copper and fiber optic media and can
serve a local area network (LAN) or span great distances in wide area networks (WAN).
• The first dimension of the cybersecurity cube identifies the goals to protect cyberspace: data
confidentiality, data integrity, and data availability.
• The second dimension represents the three possible data states: data in transit, data at rest or in
storage, and data in process.
• The third dimension defines the pillars on which to base your cybersecurity defenses. They are
technology, policy and practices, and improving education, training, and awareness in people.
• Tokenization is a substitution technique that can isolate data elements from exposure to other
data systems.
• Rights management covers both digital rights management (DRM) and information rights
management (IRM)
• Types of sensitive information are categorized as personal, business, and classified.
• Integrity is the accuracy, consistency, and trustworthiness of data across its entire lifecycle.
• Methods to ensure data integrity include hashing, data validation checks, data
consistency checks, and access controls.
• Availability ensures that information can be accessed whenever it is needed.
27
SUMMARY
• Information security requires data to be protected when it is at rest, in transit, and in process.
• Data is at rest when no user or process is accessing, requesting, or amending it.
• Data can be stored in DAS, RAID, NAS, SAN, or in the cloud.
• Data in transit is data which is being transmitted
• A sneaker net uses removable media to physically move data from one computer to another.
• Standard protocols such as IP and HTTP define the structure and formation of data packets.
• Data in process refers to data during initial input, modification, computation, or output.
• Protection of data integrity starts with the initial input of data.
• Organizations use several methods to collect data, each posing a potential threat to data integrity: data
entry, scanning forms, file uploads, and data collected from sensors.
• Software-based countermeasures or safeguards can be installed on individual hosts or servers:
software firewalls, network and port scanners, protocol analyzers, vulnerability scanners, and host-
based IDS.
• An active security awareness program depends on the organization's environment and network, the
level of threat, and the nature and demands of the data the organization holds.
• A comprehensive security policy demonstrates an organization’s commitment to security.
• Types of security policies include identification and authentication, passwords, acceptable use, remote
access, network maintenance, and incident handling.
28