Topic 01 - Cyber Security Primer

5 UNIVERSITI TENAGA NASIONAL CCSB2113 - CYBER SECURITY ESSENTIAL

  • The Energy University

  • Semester 1, 2024/2025

  • Instructor: Dr. Reema Ahmed

  • Department of Computing

  • College of Computing & Informatics

Topic 01: Cyber Security Primer

  • Overview of current state in Cyber Security

  • Important Terminology and Concepts include:

    • Asset

    • Threat

    • Vulnerabilities

  • Legal Issues surrounding Cyber Security

Introduction: Current Trends in Cyber Security

  • Goal: Making cyber networks safe a. Protecting systems and devices from attacks b. Defend against viruses and maintain cyber defense c. Importance of online safety and privacy protection

  • Key Concepts:

    • Encryption and decryption processes

    • Firewall defenses

    • Bug bounty systems for securing systems

  • Notable phrases:

    • "guard against malicious activities"

    • "maintain access control"

    • "protecting against unwanted crimes"

Confidentiality, Integrity, and Availability (CIA)

  • Confidentiality: Ensuring access only to authorized users

  • Integrity: Maintaining accuracy and reliability of data

  • Availability: Ensuring data is accessible when needed

Part 1: Definitions and Terminology

Cyber Security Definition

  • Comprehensive Terms:

    1. Prevention of damage and restoration of systems

    2. Ability to protect cyberspace from attacks

    3. Process of protecting information by preventing, detecting, and responding to threats

    4. Focus on safeguarding confidentiality, integrity, and availability of information

Importance of Cyber Security

  • Rising Costs: Expected costs of cybercrime to hit $6 trillion annually by 2021.

  • Data Breaches: 1.76 billion records leaked in January 2019.

  • Vulnerabilities in IoT devices increase risks across various platforms.

  • Time to Detect Breaches: Companies average almost 200 days to discover data leaks.

The Security Triad

  • Components:

    1. Confidentiality: Authorized access to data only.

    2. Integrity: Data must remain correct and safeguarded from modification.

    3. Availability: Users need timely access to data.

The Triple A

  • Components:

    1. Authentication: Verification of user identity.

    2. Authorization: Granting access to specific data or areas.

    3. Accounting: Tracking data access and usage.

Defense in Depth

  • Concept: Layered security approach protecting networks through multiple defensive mechanisms.

  • Layers of Defense include:

    1. Data: Targeting the information.

    2. Application: Software managing limitations and access.

    3. Host: Protecting the computers running applications.

    4. Internal Network: Safeguarding corporate infrastructures.

    5. Perimeter (DMZ): Securing external connections.

    6. Physical: Protecting tangible aspects of computing.

    7. Policies, Procedures, Awareness: Organizational security policies.

Cyber Criminal vs Cyber Heroes

  • Cyber Security specialists are leading coordinated actions across:

    • Vulnerability databases

    • Early warning systems

    • Sharing cyber intelligence

    • New laws and standards

Part 2: Asset, Threat, Vulnerability

Overview of Data Protection

  • Data Types:

    • Employment Records

    • Medical Records

    • Personal Identity Data

Assets

  • Value Assessment: Asset value differs per individual (e.g., a family photo).

Threats and Vulnerabilities

  • Vulnerability: Weakness in a system (example: failure to verify user identity).

  • Threat: An action that could cause harm (e.g., data theft).

  • Attacker: Exploits vulnerabilities (example: hackers).

Risk Analysis

  • Likelihood: The probability of an event occurring (data theft, viruses).

  • Risk is derived from exposure to threats and management involves assessing and controlling threats.

The Threats in Cyber Security

  • Significant Threats:

    1. Viruses and malware

    2. Phishing and social engineering

    3. Targeted attacks based on human error

Risk Management

  • Process: Identifying, examining, and understanding organizational risks.

  • Mitigation Strategies:

    1. Authentication

    2. Anti-malware deployment

    3. Data backups

    4. Encryption

Legal Issues in Cyber Security

Cyber Laws Overview

  • Role of Cyber Laws:

    • Protect individuals online

    • Define Internet usage norms

    • Provide legal frameworks for internet operations

Advantages of Cyber Laws

  • Ensure safety for employees and organizations against cyberattacks.

  • Protect sensitive personal information.

Key Data Protection Laws

  • Privacy Act of 1974

  • Freedom of Information Act (FOIA)

  • Personal Data Protection Act (PDPA) 2010

  • Computer Crimes Act 1997

Specifics of the PDPA 2010

  • Applies to businesses processing personal data and ensures confidentiality and security in managing such data.

Conclusion

  • Overall Scenario: Emphasizes the need for comprehensive Cyber Security policies to maintain confidentiality, integrity, and availability.