Lecture 1 - Introduction Flashcards
Some cyber attacks?
- phishing
- ransomware (publication or blockage of personal data)
- malware attacks ( file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker want)
- insider threats (insider information on security etc.)
- trade secrets and insider data theft
- data leaks and breaches
Steps of the high level plan for a secure system?
- goal (the goal of the system is to protect assets from unauthorized entities)
- aspects of cyber security should be followed
- threat model
- policy
- mechanism
What is the goal of a cyber security system?
To protect assets, so that only authorized or legible entities should be able to use certain features / read files / write files etc.
What are the aspects of cyber security?
- confidentiality
- integrity
- availability
- authenticity
- accountability
- non-repudiation
What is a high level plan for a secure system?
a systematic thought required to set up a successful defense
What is a threat model?
assumptions about attacker i.e. what they can do to the system and how they would want to exploit it
What is a policy?
plan/rules that will get your system to achieve a goal e.g. having user access levels, having file permissions. Note human components can also be part of the policy.
Can a policy have human components? Example?
Yes. For example : no password sharing
What is a mechanism?
Software/ hardware that will enforce the policy set out for the system.
Is the a specific order required for the high level plan to work?
No, there isn’t a specific order, however some layering will be required to make a successfully secure system e.g. mechanism will always be after the policy (as it implements it)
Why is cyber security necessary?
To protect assets (digital, but not always files)
What is a another name for aspects of cyber security?
aspects of asset protection
What is Confidentiality? (aspect 1)
protection of information so that unauthorized persons cannot access it
What does Confidentiality imply?
That there are access control levels in the system and authentication.
What is Integrity? (aspect 2)
Ensuring nothing is lost or deleted (neither accidentally or deliberately). Nothing should be changed against permissions or user wishes. e.g. having a message digest to check for file alteration