Cyber Security Context Notes
Learning Outcomes
- Understand the general context within which cyber security exists
- Identify relevant local and international bodies involved with/ responsible for cyber security
- Appreciate the opportunities within cyber security and skilled labour shortage in the UK
- Identify the different areas of knowledge within cyber security
Introduction to Cyber Security
- Definition: Cyber security refers to the protection of computer systems, networks, and data from theft, damage, and unauthorized access.
- Importance: Essential for safeguarding sensitive data, maintaining privacy, protecting business operations, and ensuring trust online.
- Organisations Involved: Local bodies like NCSC and international bodies like the NSA play critical roles in enhancing cyber security globally.
- Skills Required: Includes technical skills (e.g., penetration testing), analytical skills, and a strong understanding of legislation.
- Related Laws in the UK: Various laws govern data protection and cyber security, including the Data Protection Act.
Basic Components of Cyber Security
- Confidentiality: Protecting information from unauthorized access.
- Integrity: Ensuring the accuracy and completeness of information.
- Availability: Ensuring authorized users have access to information when needed.
- Authenticity: Verifying the legitimacy of information and its sources.
- Authorization: Granting access rights to information only to authorized personnel.
Key Terms
- Vulnerabilities: Weaknesses that can be exploited by threats.
- Threats: Potential sources of harm to a system (e.g., cybercriminals, natural disasters).
- Countermeasures: Strategies and tools used to protect against vulnerabilities and threats.
Types of Vulnerabilities
- Physical Vulnerabilities: Relate to the physical safety of hardware.
- Software Vulnerabilities: Weaknesses in applications or systems.
- Human Vulnerabilities: Errors or actions by users that create risks (e.g., sharing passwords).
Categories of Threats
- Natural Threats: e.g., floods, earthquakes.
- Unintentional Threats: e.g., human error.
- Intentional Threats: e.g., cyberattacks from criminals or insiders.
Common Countermeasures
- Encryption: Protects data by converting it into a coded format.
- Firewalls: Prevents unauthorized access to networks.
- Authentication Mechanisms: Verifies the identity of users and devices.
- Education and Training: Promotes awareness and proper security practices among staff.
Security Attacks and Evaluation
- Weakest Link Principle: A security system's overall strength is determined by its weakest component.
- Evaluating Security: Identify and strengthen the weakest links in security.
Cyber Security Breaches Survey 2022
- Statistics: 39% of businesses faced cyber attacks in the past year, primarily through phishing.
- Costs of Breaches: The average cost of a data breach is about 4.35 million.
- Reputation Damage: Consequences extend beyond financial loss, affecting trust and brand reputation.
Cyber Security Institutions in the UK
- GCHQ: National intelligence and security agency.
- NCSC: Provides guidance and support for cyber resilience.
Global Cyber Security Organizations
- ECSO: Promotes European cyber security advancements.
- NSA: Responsible for US signal intelligence and security.
Importance of Standards
- Standards guide best practices and compliance for organizations.
- NIST: Provides a framework for measuring compliance with security measures.
- ISO Standards: Facilitate international compliance and benchmarking.
Professional Accreditation
- Certifications such as CISSP, GIAC, and Certified Ethical Hacker demonstrate proficiency in cybersecurity skills.
Cyber Security Skills Demand
- Over 697,000 businesses have a basic skills gap in cybersecurity, impacting their defense capabilities.
National Cyber Security Strategy (2022-2030)
- Goals: Strengthen organizational resilience and enhance security across government and enterprise.
Cyber Security Body of Knowledge (CyBOK)
- A growing resource containing essential knowledge in the field of cybersecurity, covering 19 areas grouped into five categories.
Conclusion
- Cybersecurity is vital for safeguarding information and systems against threats, encompassing legal, technical, and human aspects.