Chapter 2 Cybersecurity Cube
Chapter 2 Cybersecurity Cube
The cyber
Cube E
Objectives
▪ The Cybersecurity Cube
▪ Describe the three dimensions of the McCumber Cube
▪ CIA TRIAD
▪ Describe the principles of confidentiality, integrity, and availability
PLAY SINGLE PLAYER
▪ States
Play aof Data
single player offline game with computer-controlled teammates.
▪ Differentiate the three states of data.
ACHIEVEMENTS
▪ Cybersecurity
OPTIONS Countermeasures
▪ EXTRAS
Compare the types of cybersecurity countermeasures
▪ IT Security
QUIT Management Framework
▪ Describe the ISO Cybersecurity Model
PLAY SINGLE PLAYER
Play a single player offline game with computer-controlled teammates.
ACHIEVEMENTS
OPTIONS
EXTRAS
QUIT
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
CIA TRIAD
The Cybersecurity Cube Part 2
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
SINGLE PLAYER
Choose the settings that best suit your style of play
Start Game
Back
PLAY CAMPAIGN
SINGLE PLAYER
Play through a co-operative
a single player campaign
offline game online.
with computer-controlled teammates.
ACHIEVEMENTS
OPTIONS
EXTRAS
QUIT
CAMPAIGN GAMES FOUND
Select an active game to begin playing with a friend.
States Of Data
The Cybersecurity Cube Part 3
Data at Rest
• Stored data refers to data at rest. Data at rest
means that a type of storage device retains the
data when no user or process is using it.
• A storage device can be local (on a computing
device) or centralized (on the network). A
number of options exist for storing data.
Data at Rest
• Direct-attached storage (DAS) is storage
connected to a computer. A hard drive or USB
flash drive is an example of direct-attached
storage.
• Redundant array of independent disks
(RAID) uses multiple hard drives in an array,
which is a method of combining multiple disks
so that the operating system sees them as a
single disk. RAID provides improved
performance and fault tolerance.
Data at Rest
• Network attached storage (NAS) is a storage
device connected to a network that allows
storage and retrieval of data from a centralized
location by authorized network users. NAS
devices are flexible and scalable, meaning
administrators can increase the capacity as
needed.
• Storage area network (SAN) architecture is a
network-based storage system. SAN systems
connect to the network using high-speed
interfaces allowing improved performance and
the ability to connect multiple servers to a
centralized disk storage repository.
Data IN TRANSIT
• Data transmission involves sending information
from one device to another. There are numerous
methods to transmit information between devices
including:
• Sneaker net – uses removable media to
physically move data from one computer to
another
• Wired networks – uses cables to transmit
data
• Wireless networks – uses the airwaves to
transmit data
Data IN TRANSIT
• The protection of transmitted data is one of the most
challenging jobs of a cybersecurity
professional. The greatest challenges are:
• Protecting data confidentiality – cyber criminals
can capture, save and steal data in-transit.
• Protecting data integrity – cyber criminals can
intercept and alter data in-transit.
• Protecting data availability - cyber criminals can
use rogue or unauthorized devices to interrupt
data availability.
Data IN PROCESS
• The third state of data is data in process. This refers to
data during initial input, modification,
computation, or output.
• Protection of data integrity starts with the initial
input of data.
• Organizations use several methods to collect data,
such as:
• manual data entry
• scanning forms
• file uploads
• data collected from sensors.
• Each of these methods pose potential threats to
data integrity.
CREATE A NEW CAMPAIGN LOBBY
Back
CAMPAIGN GAMES FOUND
Select an active game to begin playing with a friend.
Data IN PROCESS
• Data modification refers to any changes to the
original data such as:
• users manually modifying data
• programs processing and changing data
• equipment failing resulting in data modification.
• Processes like encoding/decoding,
compression/decompression and
encryption/decryption are all examples of data
modification.
• Malicious code also results in data corruption.
Cybersecurity
Countermeasures
The Cybersecurity Cube Part 4
IT Security
Management Framework
The Cybersecurity Cube Part 5