Cybersecurity Fundamentals Vocabulary
Cybersecurity Fundamentals
- Discipline concerned with protecting the assets of computer/information systems.
- Core questions this lecture answers:
- What is cybersecurity and what are we trying to protect?
- What kinds of harm are possible and how can we avoid it?
- How do risk, threats, vulnerabilities, and controls fit together?
- Foundational triad: Confidentiality, Integrity, Availability (C-I-A).
- Frequently supplemented with Authentication & Non-repudiation.
- Central, recurring idea: All security measures exist to reduce risk by protecting assets against threats that exploit vulnerabilities.
Assets: What Needs Protection?
- Hardware
- End-user computers (desktops, laptops, tablets, phones)
- Medical devices, automobiles, industrial controllers, security systems
- Household appliances (IoT), scientific equipment, tracking/location devices
- Software / Network Resources
- Operating systems, applications, network services
- Access-control mechanisms, physical-access systems
- Location services, network traffic, device identity, user actions
- Data (most intangible, often highest value)
- Conventional files (photos, music, databases)
- Sensitive personal data: geolocation, activity logs, network identity
- Access lists, payment information, monitoring/status reports
Glossary of Basic Terms
- Vulnerability – Any weakness that can be exploited to cause harm.
- Total collection of vulnerabilities often called the "attack surface".
- Threat – Any circumstance or event with the potential to cause harm.
- Attack – Realisation of a threat via exploitation of a vulnerability.
- Countermeasure / Control – An action, device, or process that removes or reduces a vulnerability or otherwise mitigates a threat.
The C-I-A Triad & Extended Properties
- Confidentiality
- Limit access to data and to metadata to authorised entities only.
- Distinguish between full vs. partial access.
- Typical confidentiality breaches involve viewing or copying rather than modification.
- Personally Identifiable Information (PII), intellectual-property documents, and national-security data are high-value targets.
- Integrity
- Ensure data remain accurate, complete, and uncorrupted.
- All alterations must be authorised, intentional, and occur under controlled circumstances.
- Historical failures: the Microsoft Word “\not” macro prank, 1990s Intel Pentium floating-point flaw.
- Business examples: falsifying accounting or payroll values.
- Availability
- Information/system must be accessible when needed.
- Extends into operations: backups, recovery strategies, RAID, cloud replication, redundant personnel/training, business-continuity & disaster-recovery (BC/DR) planning, uptime guarantees, handling “normal” hardware failures.
- Authentication (often grouped with C-I-A)
- Validation that an entity is who/what it claims to be.
- Non-repudiation
- Assurance that a party cannot deny an action it performed (e.g.
digitally signed email).
Harm: What Can Go Wrong?
- Negative consequence of an attack; magnitude depends on asset value.
- Typical harms
- Theft (identity, financial, intellectual property)
- Loss of privacy or confidential info exposure
- Destruction or loss of asset (data deletion, hardware damage)
- Disruption of organisational operations, downtime, business loss
- Reputational damage, loss of stakeholder trust
Risk Concept
- Working definition: Risk = Likelihood \times Impact
- Likelihood → probability that a threat will successfully exploit a vulnerability.
- Impact → the quantified or qualified amount of harm that would result.
- Components considered in risk analysis
- Value of asset
- Severity of harm
- Cost & effectiveness of countermeasures
- Possibility of transferring risk (e.g.
cyber-insurance)
- Practical issues
- Hard to estimate asset value (some data are priceless).
- Hard to quantify harm (especially reputational).
- Difficult to enumerate all threats or to calculate their likelihood.
Threat Classification & Likelihood Biases
- Non-human threats: natural disasters, hardware failure, fire, earthquake.
- Human threats: accidental (spilled coffee, fat-finger data entry) or intentional (hackers, insiders, saboteurs).
- Malicious vs. non-malicious.
- Random (non-targeted) vs. directed (targeted).
- Harm types specific to human threats (Parkerian variations):
- Interception (unauthorised access)
- Interruption (availability loss)
- Modification (unauthorised change)
- Fabrication (insertion of false data)
- Cognitive bias note: People over-estimate rare catastrophic risks and under-estimate common mundane ones (e.g.
fear of air crashes vs.
complacency about automobile accidents).
Method–Opportunity–Motive (M-O-M) Triangle
- A threat actor typically needs all three:
- Method – Skills/tools/techniques.
- Opportunity – Time & access.
- Motive – Reason/incentive (financial gain, ideology, thrill, revenge).
- Controls often work by removing at least one side of the triangle.
Common Vulnerabilities (Partial List)
- Untrained users; social-engineering susceptibility.
- Insider sabotage/abuse.
- Weak authentication/poor password practices.
- Misconfiguration (default passwords, open ports).
- Lack of physical security.
- Inadequate network segmentation or traffic isolation.
Controls / Countermeasures: Overarching Categories
- Preventive – Block threats from exploiting the vulnerability.
- Firewalls, encryption, strong access controls, locked doors.
- Detective – Identify or alert when exploitation occurs.
- IDS/IPS, system logs, CCTV, audit trails.
- Deterrent – Discourage attacker by increasing perceived cost/risk.
- Policies, legal banners, user training, visible guards.
- Corrective – Lessen impact after exploitation.
- Backups, data recovery, fail-over clusters, BC/DR plans.
- Expanded “5-D” security verbs
- Prevent (eliminate vulnerability)
- Deter (make attack harder/costlier)
- Deflect (lure to less valuable decoy, e.g.
honeypot) - Detect (discover the attack)
- Recover (restore operations/assets)
Physical Controls
- Locks, security guards, mantraps, fences.
- Environmental protections: fire suppression, earthquake bracing, sealed data-center floors.
- Backup copies stored off-site or in the cloud.
- Emphasis: attackers look for weakest point → even simple physical controls can be highly effective.
Technical Controls
- Software (logical) controls
- OS permissions, Role-Based Access Control (RBAC), Mandatory Access Control (MAC).
- Password policies, Multi-Factor Authentication (MFA).
- Cryptographic functions: encryption, hashing, digital signatures.
- Dedicated security applications (anti-malware, EDR, DLP).
- Development-time controls – secure coding practices, code reviews, automated testing, DevSecOps.
- Hardware controls
- Smart cards, hardware security modules (HSM), Trusted Platform Module (TPM).
- Biometric readers (fingerprint, facial recognition).
- Network controls
- Firewalls (stateful, next-gen), routers with ACLs, segmentation & VLANs.
- VPNs, intrusion-detection/prevention systems, zero-trust architectures.
Procedural (Administrative) Controls
- Policies, Standards, Procedures, Guidelines – formal documents that tell humans what is allowed, required, or prohibited.
- Training & security-awareness programs – often cited as most important control because humans remain weakest link.
- Example policy topics
- Password composition & rotation.
- Prohibition on sharing credentials.
- Acceptable-use policy, BYOD rules.
- Confidentiality & Non-Disclosure Agreements (NDAs).
- Legal mechanisms
- Statutory protections (state/federal), industry regulations (HIPAA, PCI-DSS).
- Contractual obligations, service-level agreements (SLAs).
Practical & Ethical Considerations
- No system can ever be made 100 % secure → aim is acceptable risk level.
- Ethical imperative to safeguard user privacy & prevent misuse of data.
- Balancing security with usability & cost:
- Over-protection can stifle productivity; under-protection invites catastrophe.
- Reputation as an intangible asset: breach disclosure laws mean reputational harm often exceeds direct financial loss.
Study Tips & Connections
- Tie C-I-A concepts to every real-world security story you hear.
- When analysing any security scenario, explicitly list Asset → Threat → Vulnerability → Control.
- Map human-threat actions (interception, interruption, etc.) onto triad impacts.
- Quantitative risk analysis often uses Risk = \text{Probability} \times \text{Loss}—try simple mock calculations to build intuition.
- Revisit foundational networking, operating-system, and cryptography knowledge; each provides context for controls listed here.