Topic 01 - Cyber Security Primer
5 UNIVERSITI TENAGA NASIONAL CCSB2113 - CYBER SECURITY ESSENTIAL
The Energy University
Semester 1, 2024/2025
Instructor: Dr. Reema Ahmed
Department of Computing
College of Computing & Informatics
Topic 01: Cyber Security Primer
Overview of current state in Cyber Security
Important Terminology and Concepts include:
Asset
Threat
Vulnerabilities
Legal Issues surrounding Cyber Security
Introduction: Current Trends in Cyber Security
Goal: Making cyber networks safe a. Protecting systems and devices from attacks b. Defend against viruses and maintain cyber defense c. Importance of online safety and privacy protection
Key Concepts:
Encryption and decryption processes
Firewall defenses
Bug bounty systems for securing systems
Notable phrases:
"guard against malicious activities"
"maintain access control"
"protecting against unwanted crimes"
Confidentiality, Integrity, and Availability (CIA)
Confidentiality: Ensuring access only to authorized users
Integrity: Maintaining accuracy and reliability of data
Availability: Ensuring data is accessible when needed
Part 1: Definitions and Terminology
Cyber Security Definition
Comprehensive Terms:
Prevention of damage and restoration of systems
Ability to protect cyberspace from attacks
Process of protecting information by preventing, detecting, and responding to threats
Focus on safeguarding confidentiality, integrity, and availability of information
Importance of Cyber Security
Rising Costs: Expected costs of cybercrime to hit $6 trillion annually by 2021.
Data Breaches: 1.76 billion records leaked in January 2019.
Vulnerabilities in IoT devices increase risks across various platforms.
Time to Detect Breaches: Companies average almost 200 days to discover data leaks.
The Security Triad
Components:
Confidentiality: Authorized access to data only.
Integrity: Data must remain correct and safeguarded from modification.
Availability: Users need timely access to data.
The Triple A
Components:
Authentication: Verification of user identity.
Authorization: Granting access to specific data or areas.
Accounting: Tracking data access and usage.
Defense in Depth
Concept: Layered security approach protecting networks through multiple defensive mechanisms.
Layers of Defense include:
Data: Targeting the information.
Application: Software managing limitations and access.
Host: Protecting the computers running applications.
Internal Network: Safeguarding corporate infrastructures.
Perimeter (DMZ): Securing external connections.
Physical: Protecting tangible aspects of computing.
Policies, Procedures, Awareness: Organizational security policies.
Cyber Criminal vs Cyber Heroes
Cyber Security specialists are leading coordinated actions across:
Vulnerability databases
Early warning systems
Sharing cyber intelligence
New laws and standards
Part 2: Asset, Threat, Vulnerability
Overview of Data Protection
Data Types:
Employment Records
Medical Records
Personal Identity Data
Assets
Value Assessment: Asset value differs per individual (e.g., a family photo).
Threats and Vulnerabilities
Vulnerability: Weakness in a system (example: failure to verify user identity).
Threat: An action that could cause harm (e.g., data theft).
Attacker: Exploits vulnerabilities (example: hackers).
Risk Analysis
Likelihood: The probability of an event occurring (data theft, viruses).
Risk is derived from exposure to threats and management involves assessing and controlling threats.
The Threats in Cyber Security
Significant Threats:
Viruses and malware
Phishing and social engineering
Targeted attacks based on human error
Risk Management
Process: Identifying, examining, and understanding organizational risks.
Mitigation Strategies:
Authentication
Anti-malware deployment
Data backups
Encryption
Legal Issues in Cyber Security
Cyber Laws Overview
Role of Cyber Laws:
Protect individuals online
Define Internet usage norms
Provide legal frameworks for internet operations
Advantages of Cyber Laws
Ensure safety for employees and organizations against cyberattacks.
Protect sensitive personal information.
Key Data Protection Laws
Privacy Act of 1974
Freedom of Information Act (FOIA)
Personal Data Protection Act (PDPA) 2010
Computer Crimes Act 1997
Specifics of the PDPA 2010
Applies to businesses processing personal data and ensures confidentiality and security in managing such data.
Conclusion
Overall Scenario: Emphasizes the need for comprehensive Cyber Security policies to maintain confidentiality, integrity, and availability.