Lesson 2 - CyberSecurity Fundamentals
Lesson 2 - CyberSecurity Fundamentals
Cybersecurity Fundamentals
Learning Objectives
Unauthorized
Attack Threats
Access
Address
Damage
Why Cybersecurity? to protect data
Presence of crime
Increased rate
syndicates
of cyber crime
Increased demand
The world relies on technology more
than ever before, and as a result digital Presence of cyber
data creation has surged. armies
Presence of
financial frauds
Information Security and Cybersecurity
Cybersecurity
Information Security
Healthcare:
Ransomware attacks
24,000 malicious
will quadruple
mobile apps blocked daily
60% of fraud
originates from
mobile devices
300 billion passwords exist worldwide in 2020
Factors Affecting Cybersecurity
Technology Business Plans
1 for security 5
Platforms and tools
Nature of business
Network connectivity
2 Risk tolerance
CIA Triad
Governance, Risk Management, and Compliance of every organization is different and varies based on the
type of organization.
It depends on organization mission, size, industry, culture, and legal regulations.
Culture Industry
Responsibility of GRC
The ultimate responsibility of the GRC program is to protect their assets and operations IT, including their infrastructure
and information.
GRC
levels. These risks may include investment risk, physical risk, and cyber risk.
Governance
Risk Management
Compliance
GRC
regulations.
Governance
Risk Management
Compliance
Roles of Cybersecurity
Cybersecurity Roles
The success of a cybersecurity role is ultimately the responsibility of the board of directors.
Board of Directors Committee Management
Approaches to Cybersecurity
Residual risk
Illustration: Basics of Cybersecurity
Threat Actors, Attacks, and Mitigation
Threat Actor
A threat actor or malicious actor is a person or entity that is responsible for an event or incident that impacts or has the
potential to impact the safety or security of another entity.
Threat Actor Categories
Rootkit
Backdoor
Logic bombs
Worms Viruses Trojans Spyware
Ransomware
Worms
Worms are self-replicating codes designed to penetrate computer systems.
Virus
Trojans are programs that claim to perform one function but does another, typically malicious.
Spyware
Rootkits are designed to modify the operating systems’ operations to facilitate non-standard functionality.
Backdoor
Backdoor provides the attacker with unauthorized remote access to a system by exploiting security vulnerabilities.
Logic Bombs
Logic bombs infect a system and lie dormant until they are triggered by a specific condition.
Ransomware
Ransomware attempts to extort money from the user by infecting and taking control of a victim's machine.
Malware Attacks
Ghost Mirai
Denial-of-Service Attack
Service
terabits per
second of traffic.
DoS/DDoS Attacks
They refer to a type of malicious behavior designed to target the top layer in the OSI model.
Application Layer Attacks
injection DoS/DDoS
Software Codes and Security
Progr
Static Testing
Dynamic Testing
In March 2018, hackers hit Saks Fifth Avenue and Lord & Taylor, stealing debit and credit cards.
5 million records breached
Software Testing Methods
In May 2018, the concert and sporting event ticketing website, ticketfly was vandalized,
taken down, and disrupted for a week.
Security Attacks
In August 2018, Russian hackers made millions selling credit card details stolen from almost
245,000 British Airways customers.
Social Engineering
It is the art of manipulating people, so they give up their confidential information violating
the security principle.
Spear Phishing
In 2017, Ethereum Classic website was hacked resulting in the loss of thousands of dollars in
cryptocurrency.
policy guidelines
End Users
Operational Plan
● Is a long-term plan
● Defines security posture
● Is valid for five years and is
renewed annually
● Helps understand security
functions
● Helps in risk assessment
Types of Security Management Plan
Strategic Plan Tactical Plan
Operational Plan
● Is a mid-term plan
● Provides detailed goals
● Is updated every year or two
● Is technology oriented
Types of Security Management Plan
Strategic Plan Tactical Plan
Operational Plan
● Is a short-term plan
● Is highly detailed
● Is updated monthly or
quarterly
● Spells out how to accomplish
goals
Security Policy
• Is a strategic plan
Organizational
policy
Procedure
Guideline Baseline
● Is system specific
Standard
the compulsory
requirements
document
● Reasonable care is taken in protecting the ● Is about practicing the activities that maintain
organization the due care effort
● Pertains to the legal duty of the organization ● Pertains to best practices that a company
should follow
● Lack of due care is considered negligence
● Might not be legally liable
Cybersecurity Mitigation Methods
Information Technology Control
An IT control is
It is an action or method that is applied to prevent, avert, or reduce potential threats to:
Administrative
Administrative Controls
These are procedures and policies used to define employee actions toward sensitive information.
Technical Controls
These are procedures and policies used to define employee actions toward sensitive information.