Cyber Security Module 3 Notes
Cyber Security Module 3 Notes
Learning Objective:
Learning Outcome:
Weightage (%) 5 15 10 10 60
C I
• CIA S
– Confidentiality: Who is authorized to use
data? A
◼ Authorization
◼ Non-repudiation
Confidentiality – restrict
access to authorized
individuals
Integrity – data has not been
altered in an unauthorized
manner
Availability – information
can be accessed and
Availability modified by authorized
individuals in an appropriate
timeframe
Dr. Vikas Kamra, Amity University, Noida
Need to Balance CIA Amity School of Engineering & Technology
increase integrity
◼ Confidentiality suffers as more people see data, availability
• Complex
Context-dependent
Could mean any subset of these asset (data or service)
properties :
{ usefulness / sufficient capacity /
progressing at a proper pace /
completed in an acceptable period of time / ...}
Why we need
Parkerian Hexad
model?
• The CIA model also seems very technology driven and does
not focus enough on the human element of information
security.
Confidentiality
Possession/Control
Integrity
• It is a known fact that employees are one of the biggest threats to data
Dr. Vikas Kamra, Amity University, Noida
Integrity Amity School of Engineering & Technology
Authenticity
• The internet has enabled us all the ability to do just about anything
and everything from our homes such as filing our taxes,
performing bank transfers, check credit reports and scores, and
paying bills.
• Because of these abilities, and many others, technologies were
developed to give customers the confidence in knowing that the
site they are visiting is legitimate and the communication is
secure.
• there are several ways to accomplish the goal of authenticity. One
of the most common methods used today is the use of digital
certificates. Dr. Vikas Kamra, Amity University, Noida
Availability Amity School of Engineering & Technology
Availability
Utility
• Authentication
• Access Control
• Encryption
• Passwords
• Backup
• Firewalls
• Virtual Private Networks (VPN)
• Physical Security
• Security Policies
• Text Reading:
• Cybersecurity, Wiley Publishers, Nina Godbole and Sunit Belapur
• References:
• Cybersecurity: Managing Systems, Conducting Testing and Investigating
Intrusions, Wiley, Thomas J. Mowbray