Cyber Security Cube-SNN
Cyber Security Cube-SNN
Cybersecurity
Compare the types of cybersecurity countermeasures.
Countermeasures
IT Security
Management Describe the ISO Cybersecurity Model
Framework
The Three Dimensions of
the Cybersecurity Cube
The Principles of Security
• The first dimension of the cybersecurity cube identifies the goals
to protect the cyber world. The goals identified in the first
dimension are the foundational principles of the cybersecurity
world.
• These three principles are confidentiality, integrity and availability.
• The principles provide focus and enable cybersecurity specialists
to prioritize actions in protecting the cyber world.
• Use the acronym CIA to remember these three principles.
The States of Data
• The cyber world is a world of data; therefore, cybersecurity
specialists focus on protecting data. The second dimension of the
cybersecurity cube focuses on the problems of protecting all of
the states of data in the cyber world. Data has three possible
states:
1) Data at rest or in storage 2) Data in transit 3) Data in process
The Three
Dimensions of the
Cybersecurity Cube
Cybersecurity Safeguards
• The third dimension of the
cybersecurity sorcery cube
defines the types of powers used
to protect the cyber world. The
sorcery cube identifies the three
types of powers:
• Technologies - devices, and
products available to protect
information systems and fend off
cyber criminals.
• Policies and Practices -
procedures, and guidelines that
enable the citizens of the cyber
world to stay safe and follow good
practices.
• People - Aware and
knowledgeable about their world
and the dangers that threaten
their world.
CIA TRIAD -
Confidentiality
The Principle of Confidentiality
• Confidentiality prevents the disclosure of information to
unauthorized people, resources and processes. Another
term for confidentiality is privacy.
• Organizations need to train employees about best
practices in safeguarding sensitive information to
protect themselves and the organization from attacks.
• Methods used to ensure confidentiality include data
encryption, authentication, and access control.
Protecting Data Privacy
• Organizations collect a large amount of data and much
of this data is not sensitive because it is publicly
available, like names and telephone numbers.
• Other data collected, though, is sensitive. Sensitive
information is data protected from unauthorized access
to safeguard an individual or an organization.
CIA TRIAD-
Confidentiality
(Cont.)
Controlling Access
Access control defines a number of protection
schemes that prevent unauthorized access to a
computer, network, database, or other data
resources.
The concepts of AAA involve three security
services: Authentication, Authorization and
Accounting.
Authentication verifies the identity of a user to
prevent unauthorized access. Users prove their
identity with a username or I.D.
Authorization services determine which resources
users can access, along with the operations that
users can perform. Authorization can also control
when a user has access to a specific resource.
Accounting keeps track of what users do, including
what they access, the amount of time they access
resources, and any changes made.
CIA TRIAD- Confidentiality
(Cont.)
Cybersecurity
component from the organization to the cloud provider.
• Software as a Service (SaaS) allows users to gain access to
ISO/IEC 27000 is an
information security
standard published in 2005
and revised in 2013, latest
2018. ISO publishes the
ISO 27000 standards.
Even though the standards
are not mandatory, most
countries use them as a de
facto framework for
implementing information
security.
Security Management
Framework
Using the ISO
Cybersecurity Model