Ch1: Todays security professionals
Cybersecurity fundamentals (CIA triad )
1. Confidentiality: prevent unauthorized access to sensitive data( firewalls , encryption etc..)
2. Integrity: Ensure data is not altered by unauthorized parties ( Hashing etc..)
3. Availability : Ensure system and data are available when needed ( backups, fault tolerance)
Nonrepudiation
➢ Assurance that someone cant deny an action ( sending message)
➢ Implemented through digital signature
Cybersecurity threats(DAD triad)
➢ Disclosure : Unauthorized access( violates confidentiality )
➢ Alteration: Unauthorized modification (violate integrity )
➢ Denial: Disruption of access ( violate availability )
Types of risks from breaches:
1.finincal Risk: direct or indirect monetary losses.
2.Reputational Risk: loss of trust by customers and stakeholders .
3.Startigic Risks: Long term impact on achieving goals (leaked product plans)
4.Opreational Risks: Disruptes day-to-day functions.
5-Complince Risk: violating laws or regulations ( HIPAA, PCC SD)
**Risks can be in more than one category.
Gap Analysis
By category :
➢ Technical: Software/Hardware tools (firewall, encryption)
➢ Operational: Day-to-day practices (log reviews)
➢ Managerial: High-level planning and risk analysis
➢ Physical: locks, camera, fencing.
Information Classification: Public
By Type:
➢ Preventive: sops incident (access controls)
➢ Detective: identifies incident (IDS)
➢ Corrective: Fixes issue post-incidents (backups restore)
➢ Deterrent: discourages attacks (warning signs)
➢ Compensating: Alternatives when primary control isn’t feasible.
➢ Directive: guides behavior ( polices )
Data Protection:
Three data states:
1.Data in Rest: stored data , protect with encryption.
2.Data in transit: Network-transmitted ; protect with encryption.
3.Data in Use: Actively processed data, protect memory
Encryption:
Convert data into unreadable form unless decrypted.
Protect both stored and in transmitted data.
Data Loss prevention (DLP)
Prevent unauthorized sharing or leakage of sensitive data:
Types of DLP:
➢ Agent-Based: installed on devices.
➢ Network-Based: monitors traffic on network.
Methods of DLP:
➢ Pattern matching: Detects data formats like SSns.
➢ Watermarking: Track tagged documents.
Data Minimization and Obfuscation
Techniques:
➢ Hashing: one way transformation ( vulnerable to rainbow tables)
➢ Tokenization: Replaces data with a unique ID ( reversible with lookup)
➢ Masking: Partially hides data( credit card numbers)
Information Classification: Public
Access control
➢ Geographic: based on location.
➢ Permission-based: Based on user roles and authorization.
Segmentation Vs. Isolation
➢ Segmentation: Network separation with some communication allowed.
➢ Isolation: No external communication at all.
Information Classification: Public