Cybersecurity 1
Cybersecurity 1
Security
▪Course name: Cyber Security (CSSF3021_3181799)
▪Course instructor: Dr. Uddipana Dowerah
▪Lectures per week: 3
2
Administration & Passing Criteria
• Total number of lectures: 3 hours in a week
• Mid Sem- 20%
• End Sem- 30%
• Internal Assessment- 50%
• Detailed breakup of Internal Assessment:
• 85 or above for Outstanding (O) & 35 marks is the minimum passing marks
▪ Attendance
▪ Manual attendance
▪ Via smart card scanning
▪ Seminar/Presentation
▪ Group seminar (?)
▪ Individual seminar (?)
▪ Self Study
▪ textbooks, online lectures, internet
Contact/Communication
Reference Books
1. Dr. Erdal Ozkaya, “Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started
in cybersecurity”, Packt publisher, 2019.
2. Charles J. Brooks, Christopher Grow, Philip Craig, and Donald Short, “Cybersecurity Essentials”,
Sybex, 2018.
Course Plan
• Cyber security is how individuals and organizations protect themselves from the
risk of cyber attacks.
• Cyber attacks – hacking, identity theft, financial cyber crimes
• Almost everything we use is connected to the internet – smartphones,
computers, wearables to home appliances
• From online banking and shopping, to email and social media – more important
than ever to prevent cyber criminals from getting access to our accounts, data
and devices
• “Cyber security is the use of technologies, practices and policies for protecting
devices, networks, programs and data from cyber attacks.”
• Core function – protect our devices (smartphones, computers) and the services
we use online – from theft or damage.
Motivation
▪ PPML:
• Datasets (healthcare, finance) often contain sensitive information.
Cybersecurity can ensure the confidentiality of this data.
• Secures model from being stolen (model theft) or manipulated (model
poisoning)
• Ensures secure data sharing and computation in distributed AI systems like
federated learning
Unit 1- Overview & Fundamentals of Information Security
• Introduction to Information Security
• Information Security Principles,
• Security Threats and Vulnerabilities,
• Risk Management,
• Security Policies and Procedures,
• Security Controls and Technologies,
• Security Incident Response,
• Legal and Ethical Considerations,
• Emerging Trends in Information Security.
Security Overview
What is Security?
• Confidentiality
• Integrity
• Availability
CIA Triad
Confidentiality
Integrity
Availability
Interception Interruption
Types of
attacks
Modification Fabrication
Attacks
Confidentiality • Interception
• Interruption
Integrity • Modification
• Fabrication
• Interruption
Availability • Modification
• Fabrication
Attacks
Interception:
• Allow unauthorized users to access private or confidential information
• Primarily an attack against confidentiality
• Unauthorized file viewing or copying, eavesdropping on phone conversations or
reading e-mail, and can be conducted against data at rest or in motion
• Man-in-the-middle attack
Mitigation:
• Encrypting communications
• Avoiding untrusted wi-fi networks
• Regularly updating softwares
Attacks
Interruption:
• It can cause our assets temporarily or permanently unusable or inaccessible,
disrupting their availability and functionality
• Often affect availability but can be an attack on integrity as well
• DoS attack, Viruses to delete data or disable system functioning
Mitigation:
• Firewalls
• System backups
Attacks
Modification:
• It involves not only gaining access but also manipulating our asset
• Primarily an attack against integrity but could also be an attack on availability
• Accessing a file in an unauthorized manner and altering the data- attack on integrity
• If the file is a configuration file that controls the behavior of a service (web server)-
affect availability of that service by changing the contents of the file
• Man-in-the-middle
Mitigation:
• Intrusion detection systems
• Data encryption
• Access Controls
Attacks
Fabrication:
• Intruder injects bogus data, communications or other activities in the system
• Primarily an attack against integrity but could also be an attack on availability
• Generating false data such as malicious emails spreading malware is an integrity attack
• Can also disrupt system availability by injecting an overdose of traffic into a network
• Identity spoofing by creating a fake version of a legitimate user
Mitigation:
• Digital signatures
• Data encryption
Attacks
Threats, Vulnerabilities, and Risk
Threats:
• Potential to cause harm to our assets
- Asset: pure information, physical assets like buildings or computer systems, software used to
process information
Vulnerability:
• A weakness of an asset that can be exploited by one or more threats
• Could be a specific operating system or application we are running, a physical
location (of the office building)
• Someone going out into a “cloudy” environment without an umbrella
Threats, Vulnerabilities, and Risk
Risk:
• A combination of threat and vulnerability
• If there is a threat (of rain) and a vulnerability (of not carrying an umbrella) then
there is a risk that the person might get drenched and ruin their clothes
• Risk is the likelihood that something bad will happen when there is a potential
threat due to a vulnerability
Impact:
• The result of an information security incident caused by a threat that affects
assets.
• Gravity of a risk is decided by its potential impact.
Threats, Vulnerabilities, and Risk
Risk Management
Risk Management: Process of minimizing risks to organizational
operations, assets or individuals.
Risk Assessment:
• Measures the severity of threats and creates a risk profile for the identified risks
• Could be as simple as calculating the capital loss
• In information security, an organization might compare the cost of a security
breach to the cost of implementing a security system to reduce the risk.
Risk Management
Risk Mitigation:
• Methods to eliminate or reduce the identified risks
• Implementing necessary security controls, Improving existing security measures
and by following best practices to make risk management more effective.
Risk Governance:
• Risk governance is the process of making sure that the risk mitigation techniques
that have been adopted are put into place and that the employees adhere to those
policies.
Risk Management
Some of the top RMFs
• NIST cybersecurity framework
• ISO 31000
• COBIT 2019
AI Risk Management:
• NIST AI Risk management framework
• ISO/IEC 42001: AI risk management
Security Controls
Security Controls:
• Measures to help mitigate risks
• Three types: Physical, Logical and Administative
1. Physical Control:
• Protect the physical environment in which our systems sit, or where
data is stored
• Include things like fences, gates, locks, guards, access control cards etc.
• Attackers can steal or destroy the system making it unavailable for our
use
Security Controls
2. Logical/Technical Controls:
• Protect the systems, networks and environments that process, transmit
and store our data
• Include passwords, encryption, firewalls etc.
3. Administrative Control:
• Based on rules, laws, policies, procedures, guidelines and other items
that “paper” in nature
• Ensures that set policies and procedures are complied with
• Physical access to facilities, auditing, usage of company resource etc.
Security Policies, Standards and Procedures
Security Policy:
• A document that states in writing how a company plans to maintain the
confidentiality, integrity, and availability of its data
• High level plans, rules, guidelines that establishes security
requirements
• Continuously updates as technologies, vulnerabilities and security
requirements change
• An information security policy should describe an information security
control that can be enforced
Security Policies, Standards and Procedures
Security Standards:
• Provide more specific details that enable policies to be implemented
within the organization using different technologies.
• Provide the necessary level of detail to make a security policy practical
across the entire organization.
Security Procedures:
• Step-by-step instructions that people will follow to implement policies
(or even standards.)
• Procedures provide the “how”
• Example - Employee Termination Procedure
• Manager notifies HR and IT – HR conducts exit interview – IT suspends user ID – Manger and HR
collects company property
Security Policies, Standards and Procedures