1.1-Principles of Cibersecurity
1.1-Principles of Cibersecurity
Principles of Cybersecurity
• Goals of Cybersecurity
• Principles of Cybersecurity
• Security Policy
Sergio Pastrana
Cybersecurity
Definition: The ability to protect or defend the use of cyberspace
from cyber attacks.
Cyberspace:
Environment made up of digitalized data that is created, stored
and shared.
Composed by:
Computers, systems and infrastructures.
People.
Physical systems that depend on computing and networks.
Sergio Pastrana
Cybersecurity
4
Sergio Pastrana
Cybersecurity
Communications security:
“Protection against a threat to the technical infrastructure of a
cyber system which may lead to an alteration of its
characteristics in order to carry out activities which were not
intended by its owners, designers or users.”
Information Security:
“Protection against the threat of theft, deletion or alteration of
stored or transmitted data within a cyber system.” ENISA
“Preservation of confidentiality, integrity and availability of
information.” ISO/IEC 27000
Sergio Pastrana
Cybersecurity: Goals
Classical security goals: CIA Triad
ty
ali
Int
nti
eg
de
rity
CIA
nfi
Co
Availability
But also…
Privacy Authentication Access Control
Fairness
Non-repudiation Resilience
Authorization
Sergio Pastrana
Confidentiality
• Ensuring that information is not accessed by
unauthorized persons
– Prevent unauthorised disclosure of information.
– Property of the information of being secret:
• Examples
– Send your pictures to your friend through instant
messaging app.
• You and your friend.
– Send your pictures to Facebook through social networks
• You and Facebook.
– Send your medical records to the hospital for disease
assessment.
• You and the hospital.
Sergio Pastrana
Privacy
• Right of an individual to have some control over how
personal data is collected, used and disclosed
– EU General Data Protection Regulation (GPDR)
– Privacy policies!
• Property of your personal data being properly managed
and safeguarded
• Review of examples
– Send your pictures to your friend through instant messaging
app.
• Your friend discloses your app to everyone in you school
– Send your pictures to Facebook through social networks
• Facebook sells your data to political parties for targeted adverts
– Send your medical records to the hospital for disease
assessment
• A data breach leaks your data in public forums
Sergio Pastrana
Privacy in Big Data scenarios
9
Sergio Pastrana
Integrity
• Detection (and correction) of intentional and
accidental modifications of data in a computer
system
• Various examples of modification
– Corruption of hard drive
– Changing course grades by breaking into
university records
– Transferring money from one account to another
account fraudulently
Sergio Pastrana
Availability
• The property that a product’s services are accessible when
needed and without undue delay
Sergio Pastrana
Authenticity
• Ensuring that users are the persons they claim to be
Sergio Pastrana
Accountability
• Audit information must be selectively kept and protected
so that actions affecting security can be traced to the
responsible party
Sergio Pastrana
Principles of Cybersecurity
• Govern: Identifying and managing security risks.
– Know your assets, know your people, know your adversary
• Protect: Implementing security controls to reduce security
risks.
– Patch vulnerabilities, back-up data, access control policy, etc.
• Detect: Detecting and understanding cyber security events.
– Understand what is normal, and what is malicious
• Respond: Responding to and recovering from cyber security
incidents.
– Increase resilience, prompt incident response.
14
Sergio Pastrana
Principles of Cybersecurity
Security mechanisms:
– Prevention: measures to prepare your infrastructure and
prevent your assets from being damaged
• Firewall rules, user awareness, password policy, antivirus,
encryption, etc.
– Detection: measures to analyse and detect when, how, and
by whom an asset has been damaged
• Intrusion Detection Systems, system logs, forensic analysis, etc.
– Reaction/recovery: take measures so that you can recover
your assets or mitigate the damage to your assets
• Restore backups, disable breached accounts, block connections,
etc.
– Others
• Post-incident analysis, threat-intelligence collection, staff training,
etc.
Sergio Pastrana
Principles of Cybersecurity
Security
Functionality Usability
Sergio Pastrana
Principles of Cybersecurity
applications
services (middleware)
operating system
OS kernel
hardware
18
Sergio Pastrana
Cyberthreat real-time map
Are we safe?
https://cybermap.kaspersky.com
19
Sergio Pastrana
Some statistics (I)
https://www.varonis.com/blog/cybersecurity-statistics/
20
Sergio Pastrana
Some statistics (II)
21
Sergio Pastrana
Some statistics (III)
22
Sergio Pastrana
Some statistics (IV)
23
Sergio Pastrana
And one fact…
24
Sergio Pastrana
…with example
25
Sergio Pastrana
Homework
26
Sergio Pastrana
COURSE DATA PROTECTION & CYBERSECURITY