In-Depth Notes on Cyber Security

  • Cyber Security Context

    • Week 02 lecture focuses on understanding the cyber security landscape.
  • Class Housekeeping

    • Phones should be on silent to minimize disruptions.
    • Be considerate—no talking during the session.
    • Raise hands for questions and arrive on time.
  • Recording Announcement

    • This session is being recorded for internal resources.
    • Speak to the lecturer if there are concerns about the recording.
  • Learning Outcomes

    • Understand the general context of cyber security.
    • Identify relevant local and international bodies responsible for cyber security.
    • Appreciate opportunities and the skilled labor shortage in the UK.
    • Identify various knowledge areas in cyber security.
  • Introduction to Cyber Security

    • Defining what cyber security is and its importance.
    • Overview of cyber security organizations and required skills.
    • Discussion of relevant UK laws.
  • Definition of Cyber Security

    • According to NIST, cyber security is the protection of automated information systems to maintain integrity, availability, and confidentiality of resources.
  • Basic Components

    • Confidentiality: Protection against unauthorized access.
    • Integrity: Safeguarding against unauthorized changes.
    • Availability: Ensuring timely accessibility.
    • Authenticity: Verification of components and data.
    • Authorization: Prevention of unauthorized control.
  • Key Terms in Cyber Security

    • Vulnerabilities: Points susceptible to attack.
    • Threats: Possible dangers to systems (e.g., person, event).
    • Countermeasures: Techniques to protect systems.
  • Types of Vulnerabilities

    • Physical, natural, hardware/software, media, emanation, communications, and human vulnerabilities.
    • Some vulnerabilities are easier to exploit than others (e.g., cordless phone tapping with a $199 scanner).
  • Types of Threats

    • Natural Threats: E.g., natural disasters.
    • Unintentional Threats: Accidental actions causing harm.
    • Intentional Threats: From insiders (e.g., employees) or outsiders (e.g., hackers, terrorists).
  • Countermeasures

    • Examples include encryption, firewalls, authentication, and authorization.
    • Categorized into various types: technical, policy-related, education, and human intelligence monitoring.
  • Security Attacks

    • Cover concepts like eavesdropping, message tampering, and fabrication.
  • Security Evaluation

    • Strongest security systems account for their weakest link.
    • Strategies to improve security focus on identifying and enhancing weak points.
  • Cyber Security Breach Statistics (2022)

    • 39% of businesses experienced breaches, primarily due to phishing (83%).
    • 21% faced advanced attacks; 75% of larger businesses targeted.
  • Costs of Cyber Security Breaches

    • Estimated average cost of a data breach in 2022: 4.35 ext{ million}.
    • Example: British Airways faced significant reputational and financial repercussions due to a breach.
  • Key Organizations in Cyber Security (UK)

    • GCHQ: Intelligence and security agency responsible for cybersecurity efforts.
    • NCSC: Provides guidelines and support for cyber security in the UK, works towards securing the online environment.
  • Global Cyber Security Organizations

    • ECSO: European body supporting cyber security capabilities.
    • NSA: U.S. agency managing signal intelligence.
  • Standards in Cyber Security

    • Established to identify best practices and ensure compliance.
    • NIST and BSI cover benchmarks for security measures.
  • Professional Accreditation

    • Certifications include CISSP, GIAC, Certified Ethical Hacker, and various NCSC recognized courses.
  • Cyber Security Skills Demand in the UK

    • 51% of businesses have a basic skills gap; 33% face more advanced skill shortages.
  • UK National Cyber Security Strategy (2016-2030)

    • Aims to defend, deter, and develop the UK against cyber threats through organizational cooperation and resilience building.
  • Conclusion

    • Cyber security is critical for mitigating risks against cyber attacks.
    • The government is focused on closing the skills gap and updating strategies to align with evolving threats.