Class Slides - Cyber Security
Class Slides - Cyber Security
Cyber Security
Today’s Learning Outcomes
Web-based
attacks Botnets
Data
Breaches
1. Existing and Emerging Threats - Stable
Insider
Threat Ransomware
1. Existing and Emerging Threats – More Specific
AI IoT Blockchain
• Data • Outdated • 51% Attacks
Poisoning hardware and • Social
• Model software Engineering
Theft • Credentials • Cryptojackin
• Is a device g
affected?
1. Existing and Emerging Threats – AI Uses
UK Government
• National Cybersecurity Strategy (2016)
• Cyber Assessment Framework
EU
• Network and Information Systems (NIS) regulations
ISO
• ISO 27001 / ISO 27002
2. Cybersecurity in Practice – CIA Triad
Source: IBM, 2018. The CIA triad. [image] Available at: <https://www.ibm.com/blogs/cloud-computing/2018/01/16/drive-compliance-cloud/>
2. Cybersecurity in Practice – CIA Triad
Confidentiality
• Cryptography
• Access Control
Integrity
• Hashing Algorithms
• Digital Signatures
Availability
Authentication
• Something you KNOW, HAVE, ARE, DO
Authorisation
• Privilege Escalation / Creep
• Shared Accounts
• No Separation of Duties
Accounting
• ICO Data processing requirements
• Forensics, Investigations, Disclosure
2. Cybersecurity in Practice – The Reality
Speed Cost
Time Convenience
2. Cybersecurity in Practice – Activity
(b) The model gives equal weight to each of the three aspects
(Confidentiality, Integrity, Availability). In your opinion, is this
approach accurate?
Break Time
https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-2:v1:en
3. Cybersecurity and Business Planning – Risk
Rating
Likelihood Consequence
Risk Rating
3. Cybersecurity and Business Planning – Risk
Rating
M. K. Gugerty, D. Karlan, The Goldilocks Challenge: Right Fit Evidence for the Social Sector, New York, Oxford University Press, 2018.
3. Cybersecurity and Business Planning - Treatment
Reduce
Acceptance Impact /
Likelihood
3. Cybersecurity and Business Planning - Treatment
3. Cybersecurity and Business Planning
Evolve IP - Europe. 2022. Disaster Recovery Plan Template | Evolve IP. [online] Available at: <https://www.evolveip.uk/lp/disaster-recovery-plan-template>
3. Cybersecurity and Business Planning - Activity
2. We have assessed the existing frameworks for cybersecurity from the top
level down to practical implementation, and set out a number of ways in
which organisations can assure cybersecurity
Cyber Security