Session 1: Overview of Cybersecurity
Definition: Practice of protecting systems, networks, and data from attacks.
Importance:
Ensures trust in digital interactions.
Key for areas like online banking and e-commerce.
Cybersecurity: Focus on digital threats.
Information Security: Includes physical and digital information.
IT Security: Focus on technical infrastructure.
Confidentiality:
Ensures access to authorized users.
Integrity:
Protects data accuracy and reliability.
Availability:
Ensures accessibility when needed.
Definition: Sensitive information accessible only to authorized users.
Methods:
Encryption: Techniques like AES and RSA to secure data.
Access controls: Passwords and biometrics to restrict access.
Definition: Protects data from unauthorized modification.
Methods:
Hashing: Algorithms such as SHA-256 to verify data integrity.
Digital signatures: To ensure authenticity and integrity of data.
Function: Uses algorithms to generate a fixed-size string (hash value) from data.
Tampering detection: Any data change alters the hash value, enabling detection.
Common Algorithms: SHA-256, SHA-3, and MD5 (less secure).
Verification: Hashes verified on both sender and receiver sides.
Purpose: Verifies sender identity and ensures data integrity.
Key Technology: Uses Public Key Infrastructure (PKI) for generation and verification.
Trust Establishment: Combine with certificates from trusted Certificate Authorities (CAs).
Function: Restricts who can modify, delete, or add data.
Methods:
Role-Based Access Control (RBAC): Access based on roles.
Attribute-Based Access Control (ABAC): Access based on attributes.
Principle of Least Privilege (PoLP): Users given the minimum level of access necessary.
Function: Records all system changes and actions.
Tamper-Proofing: Use tools like Splunk or ELK stack to maintain logs.
Regular Reviews: Conduct log reviews for anomalies.
Purpose: Tracks changes to files and systems.
Tools: Git, SVN, or enterprise version control systems like Bitbucket.
Process: Enforce code reviews and approvals.
Function: Automated detection of changes to files or systems.
Deployment: Tools like Tripwire or OSSEC to identify critical file changes.
Alert Systems: Set up alerts for modifications to critical files.
Purpose: Maintains data copies for recovery in emergencies.
Backup Types: Create incrementals and full backups regularly.
Storage: Store backups securely offsite and test restoration processes.
Purpose: Ensures data integrity during transmission.
Protocols: TLS, HTTPS, or SFTP for encryption.
Verification: Use checksums or hashes to verify transmitted data.
Definition: Uses multiple systems to detect inconsistencies.
Deployment: Redundant databases or systems to ensure reliability.
Mechanisms: Quorum-based mechanisms in distributed systems ensure operational continuity.
Education: Train employees on integrity and error avoidance.
Maintenance: Regularly update and patch systems.
Integrity Checks: Conduct checks during audits and penetration tests.
Definition: Ensures systems are accessible when needed.
Methods:
Backups and redundancy for immediate recovery.
Comprehensive disaster recovery plans.
Definition: Deploying multiple systems for takeover in case of failure.
Implementation: Backup servers and storage for redundancy.
Failover systems that switch to backups during outages.
Use load balancers to distribute traffic across systems.
Definition: Preventing attacks that flood systems with traffic.
Implementation:
Use services like Cloudflare, AWS Shield, or Akamai.
Configure rate-limiting and traffic filtering.
Deploy IDS/IPS for intrusion detection.
Definition: Keeping systems updated to prevent failures.
Implementation:
Apply patches and updates consistently.
Conduct routine hardware and software maintenance.
Monitor system health using tools like Nagios or SolarWinds.
Definition: Ensuring data can be restored post-failure or attack.
Implementation:
Perform regular backups, both incremental and full.
Test disaster recovery plans for service restoration.
Securely store backups in diverse geographic locations.
Definition: Designing systems to maximize uptime.
Implementation:
Use HA clusters to auto-replace failed components.
Use RAID for storage redundancy.
Avoid single points of failure in systems.
Definition: Systems that handle increased load.
Implementation:
Utilize cloud services with auto-scaling features.
Monitor and adjust resource usage proactively.
Employ containerized architectures like Kubernetes for flexibility.
Definition: Protecting connectivity for service availability.
Implementation:
Use multiple Internet Service Providers (ISPs) for backup.
Implement robust firewalls and VPN solutions.
Segment networks to isolate failures.
Definition: Restrict and monitor resource access.
Implementation:
Utilize RBAC or ABAC for access management.
Monitor user activity and system performance for anomalies.
Detect unauthorized access attempts in real-time.
Definition: Preparing for disruptions effectively.
Implementation:
Develop and practice incident response plans.
Train staff on cybersecurity incident handling.
Establish communication protocols for stakeholder notification during outages.
Definition: Protecting infrastructure from physical threats.
Implementation:
Ensure data centers have backup power (UPS, generators).
Maintain optimal cooling and humidity for equipment.
Utilize fire suppression and flood protection systems.
Monitoring: 24/7 system monitoring for issue detection.
SLAs: Establish Service Level Agreements defining uptime requirements.
Audits: Regular audits to ensure compliance with availability standards.
Incident: Hackers accessed Target’s network via a third-party vendor.
Impact on CIA Triad:
Confidentiality: Sensitive data stolen.
Integrity: Trust in the brand compromised.
Availability: Disruption to systems experienced.
Breach Overview: Access through third-party vendor vulnerabilities.
Data Impact: Sensitive customer payment info and personal details stolen.
Reputation Damage: Compromised trust and potential temporary service downtime.
Consequences: Customers lost confidence in Target's data reliability.
Summary:
Cybersecurity definition and significance.
CIA Triad Components: Confidentiality, Integrity, Availability.
Question:
As a cybersecurity officer, how would you respond to a breach involving accidental sharing of customer data? Apply CIA Triad principles to manage the situation.