Instructor Materials Chapter 8: Becoming A Cybersecurity Specialist

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Instructor Materials

Chapter 8: Becoming a
Cybersecurity Specialist

Cybersecurity Essentials v1.1

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Chapter 8:
Becoming a Cybersecurity
Specialist

Cybersecurity Essentials v1.1

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Chapter 8 - Sections & Objectives

8.1 Cybersecurity Domains


Describe resources available to students interested in pursuing a
career in cybersecurity.
8.2 Understanding the Ethics of Working in Cybersecurity
Explain how ethics provide guidance.
8.3 Next Step
Explain how to take the next step to become a cybersecurity
professional.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
8.1 Cybersecurity Domains

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Cybersecurity Domains
User Domain
Common User Threats and Vulnerabilities
 The User Domain includes the users who access the organization’s
information system.
 Users can be employees, customers, business contractors and other
individuals that need access to data.
 Users are often the weakest link in the information security systems and pose
a significant threat to the confidentiality, integrity, and availability of the
organization’s data.
Managing User Threats
 Conduct security awareness training and user education.
 Enable and automate content filtering and antivirus scanning.
 Disable internal CD drives and USB ports.
 Minimize permissions, restrict access, track and monitor users and enable
intrusion detection.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Cybersecurity Domains
Device Domain
Common Threats to Devices
 Unattended workstations, user downloads, unpatched software
 Malware, use of unauthorized media, and violations of the acceptable use
policy.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Cybersecurity Domains
Local Area Network Domain
Common Threats to the LAN
 Unauthorized LAN access, unauthorized access to systems, applications,
wireless networks and data
 Network operating system software vulnerabilities, misconfigurations and
failure to perform updates
 Unauthorized network probing and port scanning

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Cybersecurity Domains
Private Cloud (WAN) Domain
Common Threats to the Private Cloud:
 Unauthorized network probing, port scanning and access to resources.
 Router, firewall, or network device operating system software vulnerability and
misconfiguration.
 Remote users accessing the organization’s infrastructure and downloading
sensitive data.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Cybersecurity Domains
Public Cloud Domain
Common Threats to the Public Cloud:
 Data breaches, loss or theft of intellectual property and compromised
credentials.
 Federated identity repositories are a high-value target.
 Account hijacking, social engineering attacks and lack of understanding on the
part of the organization.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Cybersecurity Domains
Physical Facilities Domain
Common Threats to Physical Facilities:
 Natural threats including weather problems, geological hazards, and power
interruptions
 Unauthorized access to the facilities, open lobbies, theft, unlocked data center,
lack of surveillance
 Social engineering, breach of electronic perimeter defenses

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Cybersecurity Domains
Application Domain
Common Threats to Applications:
 Unauthorized access to data centers, computer rooms, and wiring closets
 Server downtime for maintenance, IT systems down for extended periods
 Network operating system software vulnerability
 Unauthorized access to systems
 Data loss

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
8.2 Understanding the Ethics
of Working in Cybersecurity

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Understanding the Ethics of Working in Cybersecurity
Ethics and Guiding Principles
Ethics of a Cybersecurity Specialist
Ethics is the little voice in the background guiding a cybersecurity specialist as
to what he should or should not do, regardless of whether it is legal. The
organization entrusts the cybersecurity specialist with the most sensitive data
and resources. The cybersecurity specialist needs to understand how the law
and the organization’s interests help to guide ethical decisions.
Computer Ethics Institute
The Computer Ethics Institute is a resource for identifying, assessing, and
responding to ethical issues throughout the information technology industry.
CEI was one of the first organizations to recognize the ethical and public
policy issues arising from the rapid growth of the information technology field.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability
Cybercrime
Laws prohibit undesired behaviors. Unfortunately, the advancements in
information system technologies are much faster than the legal system can
accommodate. A number of laws and regulations affect cyberspace.
Cybercrime
A computer may be involved in a cybercrime in a couple of different ways. There
is computer-assisted crime, computer-targeted crime, and computer-incidental
crime. Child pornography is an example of computer-incidental crime; the
computer is a storage device and is not the actual tool used to commit the crime.
Organizations Created to Fight Cybercrime
There are a number of agencies and organizations out there to aid the fight
against cybercrime.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability (Cont.)
Civil, Criminal, and Regulatory Cyber Laws
In the United States, there are three primary sources of laws and regulations:
statutory law, administrative law, and common law. All three sources involve
computer security. The U.S. Congress established federal administrative
agencies and a regulatory framework that includes both civil and criminal
penalties for failing to follow the rules.
Industry Specific Laws
 Gramm-Leach-Bliley Act (GLBA)
 Sarbanes-Oxley Act (SOX)
 Payment Card Industry Data Security Standard (PCI DSS)
 Import/Export Encryption Restrictions
Security Breach Notification Laws
 Electronic Communications Privacy Act (ECPA)
 Computer Fraud and Abuse Act (1986)

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability (Cont.)
Protecting Privacy
 Privacy Act of 1974
 Freedom of Information ACT (FOIA)
 Family Education Records and Privacy Act (FERPA)
 U.S. Computer Fraud and Abuse Act (CFAA)
 U.S. Children’s Online Privacy Protection Act (COPPA)
 U.S. Children’s Internet Protection Act (CIPA)
 Video Privacy Protection Act (VPPA)
 Health Insurance Portability & Accountability Act
 California Senate Bill 1386 (SB 1386)
International Laws
 Convention on Cybercrime
 Electronic Privacy Information Center (EPIC)

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
Understanding the Ethics of Working in Cybersecurity
Cybersecurity Information Websites
National Vulnerability Database (NVD) - is a U.S. government repository of
standards-based vulnerability management data that uses the Security Content
Automation Protocol (SCAP).
CERT - The Software Engineering Institute (SEI) at Carnegie Mellon University
helps government and industry organizations to develop, operate, and maintain
software systems that are innovative, affordable, and trustworthy. It is a
Federally Funded Research and Development Center sponsored by the U.S.
Department of Defense.
Internet Storm Center - provides a free analysis and warning service to Internet
users and organizations. It also works with Internet Service Providers to combat
malicious cyber criminals. The Internet Storm Center gathers millions of log
entries from intrusion detection systems every day using sensors covering
500,000 IP addresses in over 50 countries.
The Advanced Cyber Security Center (ACSC) - is a non-profit organization
that brings together industry, academia, and government to address advanced
cyber threats. The organization shares information on cyber threats, engages in
cybersecurity research and development, and creates education programs to
promote the cybersecurity profession.
Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
Understanding the Ethics of Working in Cybersecurity
Cybersecurity Weapons
Vulnerability Scanners - assess computers, computer systems, networks, or
applications for weaknesses. Vulnerability scanners help to automate security
auditing by scanning the network for security risks and producing a prioritized list
to address weaknesses.
Penetrating Testing (or pen testing) - is a method of testing the areas of
weaknesses in systems by using various malicious techniques. Pen testing is
not the same as vulnerability testing. Vulnerability testing just identifies potential
problems. Pen testing involves a cybersecurity specialist who hacks a website,
network, or server with the organization’s permission to try to gain access to
resources without the knowledge of usernames, passwords, or other normal
means.
Packet Analyzers (or packet sniffers) - intercept and log network traffic. The
packet analyzer captures each packet, shows the values of various fields in the
packet, and analyzes its content. A sniffer can capture network traffic on both
wired and wireless networks.
Security Tools - There is no one size fits all when it comes to the best security
tools. Much depends on the situation, circumstance, and personal preference. A
cybersecurity specialist must know where to go to get sound information.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
8.3 Next Step

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
Next Step
Exploring the Cybersecurity Profession
Defining the Roles of Cybersecurity Professionals
The ISO standard defines the role of cybersecurity professionals. The ISO 27000
framework requires:
 A senior manager responsible for IT and ISM (often the audit sponsor)
 Information security professionals and security administrators
 Site/physical security manager and facilities contacts
 HR contact for HR matters such as disciplinary action and training
 Systems and network managers, security architects and other IT professionals
Job Search Tools
A variety of websites and mobile applications advertise information technology
jobs. Each site targets varying job applicants and provides different tools for
candidates researching their ideal job position:
 Indeed.com
 CareerBuilder.com
 USAJobs.gov

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
8.4 Chapter Summary

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
Chapter Summary
Summary
 This chapter categorizes the information technology infrastructure created by the
advancement of technology into seven domains.
 The chapter discussed the laws that affect technology and cybersecurity
requirements.
 Laws such as FISMA, GLBA, and FERPA focus on protecting confidentiality.
 Laws that focus on the protection of integrity include FISMA, SOX, and FERPA,
and laws that concern availability include FISMA, GLBA, SOX, and CIPA.
 In addition to the laws in force, the cybersecurity specialist needs to understand
how the use of computers and technology affect both individuals and society.
 The chapter also explored the opportunity to become a cybersecurity specialist.
 Finally, this chapter discussed several tools available to cybersecurity specialists.

Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Presentation ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32

You might also like