CyberSecurity Fundamentals
CyberSecurity Fundamentals
1. HTTPS (443)
2. SSH (22)
3. SFTP (22)
4. FTPS (989, 990)
5. SMTPS (465)
1. HTTP (80)
2. FTP (20, 21)
3. Telnet (23)
4. SNMP (161, 162)
5. TFTP (69)
1. Phishing
2. Proxies
3. Tunnelling
4. Mobile Malicious code
5. Phishing against Mobile Devices
5. Rogue antivirus
Security Controls:
1. Authentication, Authorization
2. Encryption
3. Firewalls
4. DNSSEC
CIA Triad:
Confidentiality:
1. Encrypting sensitive data, such as financial information or personal
identifiable information (PII), to prevent unauthorized access.
2. Implementing role-based access control (RBAC) to restrict access to
sensitive information.
3. Using secure communication protocols, such as HTTPS or SFTP, to
protect data in transit.
4. Implementing data masking or anonymization to protect sensitive data.
5. Using secure storage solutions, such as encrypted hard drives or
secure cloud storage.
Example Scenario:
- A healthcare organization implements encryption for patient records to
prevent unauthorized access.
Integrity:
1. Implementing checksums or digital signatures to ensure data
authenticity.
2. Using version control systems to track changes to sensitive data.
3. Using transaction logs to monitor and track changes to data.
5. Implementing data validation and verification processes.
Example Scenario:
- A financial institution implements transaction logging to track changes
to financial transactions.
Availability:
1. Implementing redundancy and failover systems to ensure system
uptime.
2. Using load balancing and content delivery networks (CDNs) to
distribute traffic.
3. Implementing backup power systems, such as UPS or generators.
4. Conducting regular maintenance and patching to prevent system
downtime.
5. Implementing Backups, disaster recovery and business continuity
plans.
Example Scenario:
- An e-commerce company implements a redundant server infrastructure
to ensure website availability.
Industry-Specific Examples: