Chapter 1
Chapter 1
Chapter -Zero
• Plenty of variety
▪ Confidentiality
▪ Integrity
▪ Availability
▪ Authentication
▪ Non-repudiation
▪ Accountability etc.
Confidentiality
▪ Protect unauthorized discloser of information
▪ The assurance that information is not disclosed
to unauthorized persons, processes or devices.
• This can cover two aspects:
▪ Protecting information stored in files
▪ Protecting information while in transmission.
• Example:
▪ An employee should not come to know the salary of
his manager
▪ The target coordinates of a missile should not be
improperly disclosed.
Integrity
• Protect unauthorized modification of information.
• The assurance that data/information can not be
created, changed, or deleted without proper
authorization.
▪ System integrity means that there is an external
consistency in the system: everything is as it is
expected to be.
▪ Data integrity means that the data stored on a
computer is the same as the source documents
(changed only in a specified and authorized
manner.)
• Example: an employee should not be able to modify the employee's
own salary
▪ The target coordinates of a missile should not be improperly
modified
Availability
• Cyberspace includes:
(P2P) technology;
✔ The ability to detect and resolve problems that threaten people, process, technology
and facilities.
✔ The goal of incident response is to prevent cyberattacks before they happen, and to
minimize the cost and business disruption resulting from any cyberattacks that
occur..
Goals of Incident response
✔ The primary goal of incident response is to effectively remove a threat
from the organization’s computing environment, while minimizing
damages and restoring normal operations as quickly as possible.
✔ Specifically:
✔ Confirms whether an incident occurred or not.
• Preparation of CSIRT
• The hardware ,software and documentation needed to investigate
cybersecurity incidents.
Detection and Analysis
• Security team members monitor the network for suspicious
activity and potential threats.
• They analyse data, notifications and alerts gathered from
device logs and from various security tools (antivirus
software, firewalls) installed on the network, filtering out
the false positives and triage the actual alerts in order of
severity.
• Detection of Incident
• Detection of remote attack
• System Crash
• Child Pornography
Containment
• The incident response team takes steps to stop the breach from
doing further damage to the network.
• Containment activities can be split into two categories:
• Short-term containment measures focus on preventing the
current threat from spreading by isolating the affected systems
operations.
• The CSIRT seeks to determine the root cause of the attack, identify
how it successfully breached the network, and resolve
vulnerabilities so that future incidents of this type don't occur.
Data Breach Incidents by Industries
END!!