Uploaded by Farhad Angar

Cybersecurity Introduction

advertisement
Introduction to Cybersecurity
1. Definition of Cybersecurity
Cybersecurity refers to the practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are typically designed to access, change, or destroy sensitive information,
interrupt normal business processes, or extort money from users. The techniques are constantly
evolving as technology, and the ways we use it, continue to change.
2. Difference Between Cybersecurity and Information Security
While often used interchangeably, cybersecurity and information security refer to two different
concepts.
•
Cybersecurity is a subset of information security that deals specifically with protecting
systems, networks, and data in cyberspace from digital attacks. It's concerned with threats
that exist in the digital (or cyber) realm, such as hacking, phishing, malware, and so forth.
•
Information security (also known as InfoSec) is a broader term that encompasses the
protection of information and data from any kind of threat, regardless of the form the data
may take. This can be digital or physical, making it a broader term than cybersecurity. For
example, if someone were to steal a physical file containing sensitive information, this would
be an information security issue, not a cybersecurity issue.
3. Key Principles of Cybersecurity
There are several fundamental principles in cybersecurity:
•
Confidentiality: Ensuring that data and information systems are accessible only by
authorized parties. Techniques to ensure confidentiality include encryption, access controls,
and security protocols.
•
Integrity: Safeguarding the accuracy and reliability of data and systems. This principle
ensures that information isn't altered or destroyed in an unauthorized manner. Techniques
include version control, checksums, and backups.
•
Availability: Ensuring that data and systems are available to authorized users when needed.
This involves maintaining hardware, performing hardware repairs, and having a plan for
recovering from catastrophic failures.
•
Non-repudiation: Ensuring that a party to a contract or a communication cannot deny the
authenticity of their signature on a document or the sending of a message.
•
Accountability: This refers to the security property that ensures that actions of an entity can
be traced uniquely to the entity.
These are the foundational principles that guide the development and implementation of effective
cybersecurity strategies.
Types of Cyber Attacks
1. Malware
Malware, short for malicious software, encompasses several types of harmful software, including
viruses, trojans, worms, and ransomware.
•
Viruses are programs that attach themselves to clean files and spread throughout a
computer system, infecting files with malicious code.
•
Trojans appear as legitimate software, or are hidden in legitimate software, and are
designed to grant a hacker remote access to a target computer system.
•
Worms infect entire networks of devices, either local or across the internet, by using
network interfaces. They use each consecutively infected machine to infect others.
•
Ransomware is a type of malware that encrypts the victim's files and then demands
a ransom to decrypt these files. Notable examples include WannaCry and Petya
outbreaks.
2. Phishing
Phishing is a type of attack carried out to steal sensitive information, like login credentials and credit
card numbers. Attackers masquerade as a trustworthy entity and trick their victims into opening an
email, instant message, or text message. The recipient is then tricked into clicking a malicious link,
which can lead to the installation of malware, the freezing of the system as part of a ransomware
attack, or the revealing of sensitive information.
3. Social Engineering
Social engineering is a method attackers use to deceive individuals into providing confidential
information that can be used to carry out attacks. They exploit the human element of cybersecurity.
Common methods include pretexting, baiting, and tailgating.
4. DoS/DDoS Attacks
Denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks are carried out to overwhelm a
system's resources, making the system slow for legitimate users, or even shutting it down entirely.
Attackers can do this by flooding the system with traffic or sending information that triggers a crash.
In a DDoS attack, the incoming traffic flooding the victim originates from many different sources,
making it impossible to stop the attack simply by blocking a single source.
5. Man-in-the-Middle (MitM) Attacks
MitM attacks happen when attackers place themselves between the communications of a client and
a server. The attacker can then sniff the traffic, intercept the data, and even alter the communication
or send their own messages.
In each of these cases, understanding how the attack works is the first step in defending against
them. Cybersecurity is a constantly evolving field, and the tactics, techniques, and procedures (TTPs)
used by attackers change regularly. However, the fundamentals of how these types of attacks operate
largely remain the same, and understanding these can help you better prepare for and defend
against them.
Cybersecurity Technologies
1. Firewalls
Firewalls are one of the first lines of defense in network security. They are essentially barriers that
monitor and control incoming and outgoing network traffic based on predetermined security rules.
Firewalls can be hardware or software-based and help protect your network by filtering traffic and
blocking outsiders from gaining unauthorized access to the private data on your computer.
2. Intrusion Detection/Prevention Systems (IDS/IPS)
IDS are designed to detect suspicious activity in your network, such as breaches by malicious hackers,
and alert the system or network administrator. IPS, on the other hand, not only detects the potential
threat but also prevents it from doing harm. They work by identifying malicious activity, logging
information about this activity, reporting it, and attempting to block it.
3. Antimalware
Antimalware software is designed to prevent, detect, and remove malicious software on individual
computing devices and IT systems. It can protect against a variety of threats, such as viruses,
ransomware, and spyware.
4. Encryption
Encryption is a method of encoding data to prevent unauthorized access. It involves converting the
data into a code to prevent unauthorized access. Even if data is intercepted or breached, encryption
ensures that an attacker cannot read the data. Two types of encryption are symmetric (private-key
encryption) and asymmetric (public-key encryption).
5. Two-Factor Authentication (2FA)
2FA adds an extra layer of security by requiring users to provide two forms of identification before
accessing their account. This often involves a password and a second factor, like a code sent to your
phone. Even if your password is compromised, an attacker would still need the second factor to
access your account.
6. Virtual Private Networks (VPNs)
A VPN creates a private network from a public internet connection. It masks your internet protocol
(IP) address, so your online actions are virtually untraceable. VPN services establish secure and
encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot.
Each of these technologies has its own strengths and is typically used in combination with others to
create a comprehensive security infrastructure. They're essential tools for safeguarding data,
preventing unauthorized access, and ensuring the integrity and availability of data.
Cybersecurity Best Practices
1. Password Management
Strong password practices are crucial for securing online accounts. This means using complex, unique
passwords for each account and changing them regularly. It's also advised to use a password
manager, a tool that generates and stores complex passwords for you.
2. Software Updates
Regularly updating software is another crucial cybersecurity best practice. Updates often include
patches for security vulnerabilities that have been discovered since the last version of the software
was released. By regularly updating your software, you ensure that you're protected against these
vulnerabilities.
3. Backups
Regular data backups are vital for recovery in the event of a data loss incident, whether from a cyber
attack, such as ransomware, or a physical incident like a fire or flood. It's best practice to follow the
3-2-1 rule: have at least three copies of your data, store the copies on two different media, and keep
one backup copy offsite.
4. Secure Browsing
Secure browsing means being careful about the websites you visit and the links you click. This
includes checking for "https" in the URL, which indicates the website has an SSL certificate, meaning
the data you send to the site is encrypted. Additionally, you should be wary of pop-ups and
unsolicited downloads, and use a secure, updated web browser.
5. Email Safety
Email safety involves being cautious about opening emails from unknown senders and not clicking on
links or downloading attachments in such emails. Phishing scams often use email to trick users into
revealing sensitive information, such as passwords or credit card numbers. Always verify the sender
and be wary of emails asking for sensitive information, even if they seem to be from a trusted
source.
By following these best practices, you can significantly decrease your vulnerability to various cyber
threats and protect your data from unauthorized access and loss. It's important to remember that
cybersecurity is not a one-time thing but a continuous process that requires ongoing attention and
adjustment as the threat landscape evolves.
Cybersecurity Policies and Standards
1. ISO 27001
ISO 27001 is an international standard that provides a framework for establishing, implementing,
maintaining, and continually improving an Information Security Management System (ISMS). The
standard helps organizations manage security efforts and protect information through risk
management. It covers not only IT but all business operations that involve handling data.
2. GDPR (General Data Protection Regulation)
GDPR is a regulation enacted by the European Union in 2018 to strengthen and unify data protection
for all individuals within the EU. It regulates how businesses should handle personal data, providing
strong protection rights for individuals. Non-compliance can result in severe fines. Key aspects
include the right to be forgotten, data portability, and privacy by design.
3. HIPAA (Health Insurance Portability and Accountability Act)
HIPAA is a US regulation designed to provide privacy standards to protect patients' medical records
and other health information provided to health plans, doctors, hospitals, and other healthcare
providers. It involves stringent data protection requirements for healthcare and healthcare-related
industries.
4. PCI DSS (Payment Card Industry Data Security Standard)
PCI DSS is a standard that all organizations, including online retailers, must follow when storing,
processing, and transmitting their customers' credit card data. The standards are mandated by the
card brands and administered by the Payment Card Industry Security Standards Council.
Each of these standards serves a specific purpose in different sectors but all aim to protect sensitive
information from breaches and maintain privacy. Understanding these standards is crucial as noncompliance can lead to penalties, legal action, and damage to the company's reputation. They also
serve as a guide to implementing robust cybersecurity measures and creating an organizational
culture that prioritizes security.
Cybersecurity Roles and Responsibilities
1. CISO (Chief Information Security Officer)
The CISO is a high-level executive responsible for establishing and maintaining an enterprise's vision,
strategy, and program to ensure information assets and technologies are adequately protected. This
individual oversees and coordinates security efforts across the company and liaises with stakeholders
about security threats. Key skills include strategic thinking, communication, leadership, and a broad
understanding of cybersecurity technologies and threats.
2. Security Analyst
A Security Analyst is responsible for monitoring and defending an organization's networks and
systems. They detect and prevent cyber threats, analyze data for patterns of cyberattacks, and
regularly conduct both routine and ad hoc security checks. Key skills for this role include problemsolving, attention to detail, familiarity with various security technologies, and knowledge of threat
detection techniques.
3. Security Architect
A Security Architect designs, builds and oversees the implementation of network and computer
security for an organization. They create complex security structures and ensure they work. They're
expected to predict possible security threats, build systems to counter them, and ensure that the
systems remain updated to tackle new threats. Key skills include a deep understanding of network
and computer architectures, knowledge of encryption technologies and security protocols, and
excellent problem-solving abilities.
4. Penetration Tester
Penetration Testers, or ethical hackers, use their expertise in computing and network systems to find
and patch potential vulnerabilities in an organization's cybersecurity. They simulate cyber attacks to
find vulnerabilities before actual hackers do. Key skills include a strong understanding of ethical
hacking techniques, problem-solving, knowledge of programming languages, and the ability to
communicate findings and recommendations clearly.
5. Incident Responder
An Incident Responder is tasked with addressing security incidents, threats, and vulnerabilities that
have occurred within their organization. They are responsible for coming up with strategic measures
to prevent security threats, and in the case of an attack, to swiftly and effectively address it to
minimize damage. Key skills include problem-solving, crisis management, strong knowledge of threat
landscape, and communication skills.
Each role plays a critical part in protecting an organization's data assets. While they all require a solid
foundation in cybersecurity principles, each role also has its unique requirements and areas of focus.
The best cybersecurity teams will have a range of roles and specialisms to cover all aspects of
cybersecurity.
Download