Cyber Security Lecture Notes 01
Cyber Security Lecture Notes 01
Lecture 1
Introduction
Dr Xiaoqi Ma
Outline
1 Module information
4 Security management
5 Risk analysis
6 Summary
Module Information
Module Title Cyber Security
Security is
Protection
of Assets
Reaction Detection
Recovering your assets or Detecting when an asset has been damaged, how it
recovering from damage to has been damaged and who has caused the damage
your assets
Integrity Availability
Confidentiality
Historically, security means secrecy and confidentiality
Confidentiality is defined as “Ensuring that information is accessible only to those
authorized to have access” by ISO (ISO-17799)
Confidentiality includes privacy and secrecy, which have similar meanings but have
subtle difference:
Privacy concerns protection of personal data
Secrecy concerns protection of data belonging to an organisation
Sometimes confidentiality means not only hiding the content of a document from
unauthorised view, but also hiding its existence
Integrity
Integrity is generally about making sure that everything is as it is supposed to be
It means that data cannot be modified without authorisation (prevention of unauthorised
writing)
Integrity is defined as “Safeguarding the accuracy and completeness of information and
processing methods” by ISO (ISO-17799)
Even authorised users still can breach integrity by not following correct procedures
Availability
Availability is defined as “ensuring that authorized users have access to information and
associated assets when required” by ISO (ISO-17799)
Availability means that the computing systems used to store and process the information,
the security controls used to protect it, and the communication channels used to access it
must be functioning correctly
Ensuring availability also involves preventing denial of service attack
Denial of service: the prevention of authorised access to resources or the delaying of
time-critical operations
Accountability
The above core concepts emphasise on the prevention of unwelcome events
However, for authorised users, they should take responsibilities for their own actions.
Therefore we have ...
Accountability: audit information must be selectively kept and protected so that actions
affecting security can be traced to the responsible party
So, the system should be able to identify and authenticate users, and keep an audit trail of
security events
Nonrepudiation
In law, nonrepudiation implies one’s intention to fulfil his obligations to a contract
It also implies that one party of a transaction cannot deny having received a
transaction nor can the other party deny having sent a transaction
Nonrepudiation services provide unforgeable evidence that a specific action
occurred
Typical nonrepudiation services include:
Nonrepudiation of origin: providing evidence about the sender of a document
Nonrepudiation of delivery: providing evidence about the fact that a message was delivered
to a specific recipient
Cyber Security
Actions by
adversaries trying to
exploit
vulnerabilities to
damage assets
Denial of service Repudiation
Information disclosure
Summary
1 Module information
2 Attacks and attackers
3 What are security and cyber security?
4 Security management
5 Risks