Week 1 - Cybersecurity Concepts
Week 1 - Cybersecurity Concepts
Concepts
Definition - Cybersecurity
• Prevention of damage to, protection of, and restoration of computers, electronic
communications systems, electronic communications services, wire communication, and
electronic communication, including information contained therein, to ensure its
availability, integrity, authentication, confidentiality, and nonrepudiation. – NIST
• Cybersecurity is the practice of protecting critical systems and sensitive information
from digital attacks. Also known as information technology (IT) security, cybersecurity
measures are designed to combat threats against networked systems and applications,
whether those threats originate from inside or outside of an organization. – IBM
• Cybersecurity is the practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at accessing, changing, or destroying
sensitive information; extorting money from users; or interrupting normal business
processes. Implementing effective cybersecurity measures is particularly challenging
today because there are more devices than people, and attackers are becoming more
innovative. - CISCO
Definition – Cybersecurity
(cont.)
• The word “cybersecurity” is used today to represent
several different conceptual approaches. Cybersecurity
can detail particular business functions, compliance to
industry frameworks, career pursuits, market products,
represent specific skills, etc.
• The protection of digital devices and their communication channels to
keep them stable, dependable and free from danger or threat. Usually
the required protection level must be sufficient to prevent
unauthorized access or intervention that can lead to personal,
professional, organizational, financial and/or political harm.
https://app.box.com/s/sj5xaz8a1461e7u7si3ip1361r070fed
Concept of CyberCrime
• System-based attack
attacks which are intended to compromise a computer or a computer network.
• Web-based attack
occur on a website or web applications
CyberCriminal
A cybercriminal is anyone who carries out a cyberattack.
Cybercriminals can be:
• A single person or a group of people.
• An organization for hire.
• A government entity.
1. Physical
2. Procedural
3. Legal
4. Technical
5. People
Cybersecurity Defense Points
1. Data
2. Devices
3. Applications
4. Systems
5. Networks
6. People
Cybersecurity Types and
Technologies
1. Industrial Control Systems Cybersecurity - industry
• Confidentiality:
Assurance that information is shared only among authorized persons or
organizations.
Goals of Cybersecurity
Integrity
• Availability :
Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.
Threat Landscape
Whether an organization is big or small, the entirety of the digital
landscape with which it interacts represents an entry point for a
cyberattack.
These can include:
• Email accounts
• Social media accounts
• Mobile devices
• The organization's technology infrastructure
• Cloud services
• People
Concept of Cyberspace
Cyberspace is "the
environment in
which
communication
over computer
networks occurs.“
Concept of Cyberspace
• When an attacker achieves a security breach, they'll often want to target data,
because it represents vital information. Poor data security can lead to an
attacker gaining access and control of data. This can lead to serious
consequences for the victim, whether that is a person, organization, or even a
government. This is because the victim's data could be abused in many ways.
For example, it can be held as ransom or used to cause financial or
reputational harm.
Malwares
• Malware comes from the combination of the words malicious and
software. It’s a piece of software used by cybercriminals to infect
systems and carry out actions that will cause harm. This could
include stealing data or disrupting normal usage and processes.
2. Browser security – web content filtering, security updates, prohibit unauthorized add-ons
4. Threat intelligence – collect system information, vulnerabilities and information on attacks to gain
insights and respond to cyberattacks.