Cybersecurity Ed1 Pres ch01 Concepts
Cybersecurity Ed1 Pres ch01 Concepts
10101
– Physical security: Prevention of break-ins, theft and tampering with facilities equipment
– Safety: Protection of life and health
– Environmental safety: Preventing pollution and invasion of alien species into nature.
– Civic security: Maintaining law and order
– Societal security: Protection of critical infrastructures and basic functions in the society
– National security: Preservation of national sovereignty, territorial integrity, and government
– Cybersecurity: Protection of information assets
– Data privacy: Following legal principles for collecting, storing, processing and sharing personal data
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 2
Various sources of security breaches
Threat sources Security goals
Physical security
Safety
Environmental safety
Civic security
Technical faults can cause
breach of
Societal security
National security
Cybersecurity
Data privacy
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 3
What is cybersecurity? (1)
• Cybersecurity is the protection of information assets from harm by cyberthreats.
• Information assets are:
– Data/information
– Resources involved in the processing of data/information
• IT hardware
• SW and configurations,
• IT-based business processes
• People by how they process information and interact with IT
• How can information assets be harmed?
– Breach of one or more of the security goals Confidentiality, Integrity and Availability (CIA)
• Mainly focuses on damage cause by adversarial threats
– But threats can also be technical failures
– Humans can do harm both intentionally and unintentionally
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 4
What is cybersecurity? (2)
• More verbosely, cybersecurity is the protection of information assets
from adversarial attacks that may result in unauthorized disclosure of
information, corruption of data, software and hardware, as well as disruption
of the services they provide.
• There is no exact consensus of what cybersecurity is, and there are many
different definitions proposed by various standards, guidelines, and
frameworks.
• Practitioners who know where the shoe pinches typically describe
cybersecurity in practical terms such as Rick Howard’s first principle of
cybersecurity which is “to reduce the probability of material impact due to a
cyber incident over the next three years.”
R. Howard, Cybersecurity First Principles (Wiley, 2023)
Maybe it would have been better to say «preservation of CIA of information assets».
Note that all these terms have more or less the same meaning!
Assets
Risk
Threats Vulnerabilities
Vulnerabilities
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 11
Information Security Controls
categorized according to cybersecurity functions
Cyber and
Information Security
Governance
Information Security
(ISO/IEC 27001-27002 framework)
• People: Staff must have necessary skills training for operating and managing cybersecurity, which
includes a good security culture in the organization.
• Product (Technology): Organizations must carefully consider which products/technology that in
the most optimal way can support the goal of reducing risk to an acceptable level.
• Partner: Organizations need to engage with partners when ackuiring products and services from
3rd parties. It can be a waste of money to buy an expensive security product if the vendor is not
able to provide adequate support for operating the product.
• Process: All use of technology (Product) consists of processes, so when an organization acquires
or implements security technology, they must ensure that there is an adequate process for
operating the technology. If the process is ineffective or inefficient, the technology has little value.
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 14
General Security Goals: CIA + P
• Information security is traditionally defined as the preservation of CIA:
•
• Confidentiality
• Integrity
• Availability:
Information-
•
security
Availability
• Data privacy (data protection) has an additional set of goals that includes,
among other things, CIA. The GDPR (General Data Protection Regulation)
defines data protection requirements.
Privacy
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 15
Security goals and controls
• Security goals
– independent of specific implementation
– Can be implemented with different controls
• Security controls
– Based on specific implementation, often tied to specific products
Support
Security controls:
e.g. policies – staff screening – locks – encryption
Entity Data
authentication authentication
Based on cryptographic
techniques,
User System e.g. MAC & DigSig
authentication authentication
– Biometrics
– Secondary channels Present authenticator
– 2FA, multi-factor authentication
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 21
System A System B
System Authentication
• Purpose
– Correct identification of systems through networks
• Threats:
– Fake systems
– Fraudulent transactions
– Man-in-the-middle attack
– Network intrusion
• Security controls:
– Cryptographic protocols for authentication and integrity
– For example: TLS, IPSEC
• Threats:
– Not being able to identify who was behind an action
– Lacking sufficient evidence to be able to make a report
• Security controls:
– Authentication of all users
– Logging of system events
– Electronic evidence
– Non-repudiation with digital signatures
– Digital forensics
Cybersecurity: Technology and Governance Ch. 1: Basic Concepts 24
Reliability
• The property that systems do not contain (many) errors or weaknesses.
If failures do occur, reliability also means that the systems can tolerate
certain failures without (all) functionality dropping out.
• Focuses mostly on preventing non-intended incidents, but is also
important for preventing or reducing the consequences of intended
adversarial events.
• Threats:
– Low quality in the development, configuration, error correction and operation of
systems and especially a lack of attention to secure system development.
• Controls:
– Good (or best) practices for the secure development and operation of systems,
also known as "built-in information security"
authentication
Registration of
Provide user ID
new user ID
User
Identity
management
Provisioning of provide/check
authenticator(s) authenticator(s)
Access Access
management Access control
authorization