Week 1 - Intro Flashcards
What does Cyber Security comprise?
Technologies and mechanisms that are designed to protect systems, networks and data from cyber attacks
Cyber Security Objectives
prevent unauthorised:
- disclosure of data
- modification of data
- use of network or computing resources
Cyber Security challenges:
- Considering potential attacks.
- Where to use security mechanisms: Physical placement and logical sense
- Security Key management
Asset
Anything of value to the organisation and requires protection
Vulnerability
Weakness of an asset or group of assets that can be exploited.
Bugs, protocol flaws, default passwords
Threat
Cause of harm. Can be human or environmental etc
Internal (authorised)/External (unauthorised)/Partner (in between)
White hat hackers
Ethical hackers or pen testers
Black hat hacker
Violate computer security for personal gain
Grey hat
In between white and black hat. Will look without owner permission and report the issue or publish it if the owner does not comply.
Security Risk
Possibility that threats will exploit vulnerabilities of an asset and cause harm.
models of Info Security: CIA
Overall security
- Confidentiality
- Integrity
- Availability
Models of information security: CAIN
Important for transport
- Confidentiality
- Authenticity (verified sender)
- Integrity
- Non-repudiation
Confidentiality
Need to ensure that info is disclosed only to those authorised.
Privacy
Refers to individual desire to control data access
6 example Threats to confidentiality
HSLMUI
- Hackers
- Shoulder Surfing
- Lack of paper shredding
- Malicious code
- Unauthorised employee activity
- Improper access control