Fundamentals of CS - Chapter One
Fundamentals of CS - Chapter One
Fundamentals of CS - Chapter One
Senait Desalegn
• adjective
• “involving, using, or relating to computers, especially the internet”
Logic layer
• where the platform nature of the Internet is defined and created
Information layer
• includes the creation and distribution of information and interaction
between users
Personal layer
• consists of people
Infrastructure Information
System
People Society
Driveittech.in
Big
Data
AI
AI
Individually
Implication of Organization
cyberspace ally
Nationally
Cybersecurity focuses on protecting electronic (IT) assets against external and internal
cyberattacks.
The convergence of IT and physical systems makes the scope of cybersecurity broader
• Cyber physical systems
Integrity Availability
• IPS/IDS.
• Cryptography. • Patch Management.
• Checksums (e.g. • Redundancy on
CRC). hardware power
• Message Digests (Multiple power
also known as a supplies/UPS’s/generator
hash (e.g. MD5, s), Disks (RAID), Traffic
SHA1 or SHA2). paths (Network design),
HVAC, staff.
• Digital Signatures:
• SLA’s – How much
non-repudiation. uptime do we
• -Access
SiTE AAiT - AAU control. want(99.9%?)
21
Cybersecurity goals…
IAAA (Identification, Authentication, Authorization and
Accountability)
Funding: Negligible.
Attack: Easy to detect and make use of freely available cyberattack tool.
Funding: Available.
(IBM, 2022)
SiTE - AAiT - AAU 36
Chapter One
Cyber and cyberspace
Security, information security and cybersecurity
Objectives/goals of cybersecurity
Cybersecurity threats (challenges)
Cybersecurity vulnerabilities
Cybersecurity attacks
Cybersecurity solutions (models and
mechanisms)
The importance of cybersecurity in software
SiTE - AAiT - AAU 37
Vulnerabilities
Common causes
• Hardware.
• Software.
• Network.
• Personal.
• Physical site.
• Organizational.
National
Decrease Economic
Espionage Image
Market Share Crisis
Degradation
Organization Closing Loss of
Social Crisis
Asset Loss Service Sovereignty
SiTE - AAiT - AAU
Types of cyber attacks
Based on goal/target Based on
– Cyber fraud methods/tools
– Cyber spying – Phishing
• Social engineering
– Cyber bullying
– Brute force attack
– Cyber warfare
– Denial of Service (DoS)
– etc
– Malware
– etc
• Cyber attacks that are generally aimed at gaining monetary or related gains for the perpetrator.
Cyber spying
Cyber bullying
• Cyber attacks which are designed to frighten and intimidate individuals rather than businesses or
government
An extreme form of cyber attack where at least one of the parties involved is a nation state.
• Government and critical infrastructure sites attacked by DoS attacks with a view to taking them offline
• Malware introduced to target and damage government and infrastructure facilities
These are much harder to validate as, for obvious reasons, neither the perpetrator or the victim wish
to release information
Examples.
USA Vs China
Russia? Vs USA
North Korea Vs
South Korea, USA
Spear phishing
• the targets are high-ranking bankers, executives or others in powerful positions or job titles
Whaling
Using a layered
Strong passwords, ACLs,
approach: Data encryption, EFS, backup
and restore strategy
Increases an
Application Application hardening
attacker’s risk of
OS hardening, authentication,
detection Host update management, antivirus updates,
auditing
Reduces an
Internal network Network segments, IPSec, NIDS
attacker’s
Firewalls, boarder routers, VPNs with
chance of Perimeter
quarantine procedures
success Physical
Physical security
security Guards, locks, tracking devices
Policies,
Security policies, procedures, and
Policies, procedures,
procedures, and
and awareness
awareness education
• organizations and developers need to be aware of the potential threats and the way to defend them
• to ensure systems are safe from malicious attacks and unauthorized access.
• to ensure user privacy
software security has become a crucial factor in the success of any modern business.
•By implementing security measures, organizations can reduce the security risks posed by
Reduces security risks. malicious actors.
Ensures user privacy. •Security measures help ensure that users’ data and information remain secure.
•When security measures are in place, organizations can be confident that their data and
Provides peace of mind. systems remain safe from malicious attacks.
•HIPAA, GDPR, and other security regulations require organizations to have security measures
Ensures regulation compliance. in place.
•Cyber security measures can help organizations save money by preventing security breaches
Saves the bottom line. and associated costs.