Cyber Security at the University and its Impact on Software Developers Flashcards
Purpose of Cyber Security
Cyber Security is key to defending our information assets against a growing number of threat actors with varying levels of motivation, skill and resources.
Cyber Security challenges
the threats are increasing exponentially and likely to continue increase
- Required skills are beginning less now it is possible to buy ready-made attacks from the dark web … “Hack-as-a-Service” and “Ransomware-as-a-Service”
Risk Management approaches
basic steps:
* Identify
* Assess
* Treat
* Monitor and Report
There are different types of risk:
* Operational
* Financial
* Reputational
* Market – usually found in Financial Services
Identifying Risks
How we identify potential risks
* Vulnerability scans
* IT operational teams
* IT projects
Assessing Risks
A risk is a possible event which could cause harm or loss
the key objective is to assess the two factors that influence risk
* Likelihood – how likely is it that the event will actually happen
* Impact – the amount of harm or loss that the event will cause
Treating Risks
There are different types of mitigating actions
* Acceptance – live with the risk because it is within the risk appetite
* Transference – move some or all of the risk to another party
* Avoidance – don’t to the activity in the first place so the event cannot happen
* Reduction – change something you are doing or add extra controls to reduce the likelihood, impact or both
Monitoring and Reporting Risks
Need a way to report on risk especially to senior management
* Visual diagrams make great impression and are easier to consume
* Plotting Inherent Risk and also Residual Risk clearly shows the impact of the mitigating actions
Secure Software Development Lifecycle (SDLC)
should ensure that the resulting software is Secure by Design and by Default
SDLC needs to take into account:
* Inception
* Analysis including definition of requirements
* Design
* Coding
* Testing – from unit testing through to user acceptance testing
* Operations and maintenance
* Retirement and decommissioning
Open Worldwide Application Security (OWASP) Foundation
Works to improve the security of software through:
* Community-led open-source software projects
* Worldwide chapters and members
* Local and global conferences
Key Projects are:
* OSWAP Top Ten – 10 most critical web application security risks
* OSWAP SAMM – Software Assurance Maturity Model