01 - Cyber - Security
01 - Cyber - Security
SESSION ONE
What is cyber - security
• Cyber Security is a set of processes, technologies, and methods to
protect servers, computers, networks, electronic systems, data, and
mobile devices from unauthorized access through malicious attacks.
• Securing the availability, confidentiality, and integrity of an
organization’s digital assets and software against internal or
external threats is the primary objective of cyber security.
• Cyber security sometimes has been referred to as information
technology security or information security (infosec for short).
What is cyber - security
Let us see some differences between cybersecurity and information
security.
• Information security (commonly known as InfoSec) refers to the
procedures and practices used by corporations to protect their data.
• This contains policy settings that prevent unauthorized people from
accessing company or personal data.
• Information security is a broader category that protects all information
assets, whether in hard copy or digital form.
• Information security is a fast-evolving and dynamic discipline that includes
everything, from network and security design to testing and auditing.
Types/categories of security
Network security is the practice of securing a computer network from intruders,
whether targeted attackers or opportunistic malware.
Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to
protect.
Information security protects the integrity and privacy of data, both in storage
and in transit.
Operational security includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network
and the procedures that determine how and where data may be stored or shared
all fall under this umbrella.
Types/categories of security
Disaster recovery and business continuity define how an organization responds to a
cyber-security incident or any other event that causes the loss of operations or data.
Disaster recovery policies dictate how the organization restores its operations and
information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without
certain resources.
End-user education addresses the most unpredictable cyber-security factor: people.
Anyone can accidentally introduce a virus to an otherwise secure system by failing to
follow good security practices. Teaching users to delete suspicious email attachments,
not plug in unidentified USB drives, and various other important lessons is vital for the
security of any organization.
Threats and types of cyber threats
authorized users
How to archieve these objectives
• Classifying the assets based on their importance and priority. The most
important ones are kept secure at all times.
• Pinning down potential threats.
• Determining the method of security guards for each threat
• Monitoring any breaching activities and managing data at rest and data in
motion.
• Iterative maintenance and responding to any issues involved.
• Updating policies to handle risk, based on the previous assessments.
All of the above aspects can be fit into 3 significant goals known
as the “CIA Triad”
What is the CIA Triad?
Confidentiality
Integrity
Availability
What is the CIA Triad?
The CIA Triad is a security model developed to ensure the 3 goals of
cybersecurity, which are Confidentiality, Integrity, and Availability of data
and the network.
The CIA Triad is a well-known, venerable model for the development of
security policies used in identifying problem areas, along with necessary
solutions in the arena of information security.
It guides an organization’s efforts towards ensuring data security.
We will now understand the CIA Triad in detials :
Confidentiality
The central idea behind the term confidentiality
in the CIA Triad. The CIA Triad ensures that the
data is only accessible by genuine authorized
users. It helps in preventing disclosure to
unintended parties who might exploit the privacy
of the user.
Methods to ensure Confidentiality
• Encryption of raw data
• Using biometrics for authentication
• Using Security Tokens
• Two way or multifactor authentication
Integrity
Integrity is making sure the data is unaltered
during the time of transmission and ensuring it
reaches the end-user in the correct form. It
maintains the consistency and reliability of data.
Methods to ensure Integrity
1. Making use of user access control to restrict
unauthorized modification of files.
2. Setting up backups to restore data during any
system failure.
3. Version control systems help to identify any
modification by tracing the logs.
Availability
Availability helps in delivering resources as and
when requested by the user without any
intervention like Denial of Service warnings.