Cyber Fundamentals Course 2.0
Cyber Fundamentals Course 2.0
Think of this as the foundation of your castle. It's about creating a strategy (security
posture) to protect digital treasures. Key elements include:
In practice, it means ensuring personal data, like names and emails, are handled safely,
especially under laws like the GDPR.
This domain focuses on guarding the castle's treasures—data and assets. It involves:
● Knowing what assets you have and ensuring they are securely stored, accessed,
and eventually, safely disposed of.
● Creating backups to recover data in case of a security breach.
This domain ensures that messages sent within and outside the castle walls are secure.
It’s about:
IAM is like the castle gatekeeper, ensuring only trusted individuals can enter. It focuses
on:
When building new parts of the castle or renovating, this ensures everything is done
securely. It means:
Key Takeaways
● Security Domains: Understanding these areas helps you grasp the broad scope
of cybersecurity efforts.
● InfoSec: The practices to secure information, vital across all domains.
● Principle of Least Privilege: A key strategy in many domains to minimize risk.
By getting familiar with these domains, you're laying the groundwork for a strong
understanding of cybersecurity. Each domain represents a critical piece of the puzzle in
protecting an organization’s digital assets and data.
Types of Threats:
● Insider Threats: Risks from people within the organization. Imagine an employee
with access to sensitive files decides to share them without permission.
● Advanced Persistent Threats (APTs): These are complex attacks where hackers
spend a lot of time planning and executing attacks to steal data quietly over a
long period. It's like a burglar figuring out the best way to break into a house
without getting caught.
● External and Internal Risks: Threats can come from outside the organization (like
hackers) or from within (like employees misusing data).
● Legacy Systems: Out-of-date technology that might not be secure anymore.
Using an old, unpatched computer is riskier because it's easier for hackers to
exploit known vulnerabilities.
● Multiparty Risk: When you work with other companies (third-party vendors), they
might accidentally introduce risks to your data.
● Software Compliance/Licensing: Using outdated or non-compliant software can
leave you vulnerable to attacks because they may not have the latest security
updates.
Addressing Vulnerabilities:
Security frameworks are like the blueprints for building a secure and resilient
organization. They guide how to protect against digital and physical threats, much like
how architectural plans ensure a building stands strong against natural elements.
Frameworks help organizations:
● Mitigate Risks: Identify and reduce potential dangers to data and privacy.
● Ensure Compliance: Follow laws and regulations specific to their industry, such
as HIPAA for healthcare.
● Improve Security Posture: Strengthen defenses against attacks like phishing and
ransomware.
● Physical Controls: Tangible measures like security guards, locks, and access
badges.
● Technical Controls: Software and technology-based defenses, including firewalls,
encryption, and antivirus programs.
● Administrative Controls: Policies and procedures such as employee training,
authorization processes, and emergency response plans.
At the heart of cybersecurity practices is the CIA triad, which stands for Confidentiality,
Integrity, and Availability. This model helps security teams focus on:
The CIA Triad is a cornerstone model in cybersecurity, representing three key principles
that professionals strive to protect: Confidentiality, Integrity, and Availability. These
principles help guide risk management and the development of security policies and
systems. Let's break down each component:
Confidentiality ensures that information is accessible only to those who are authorized
to view it. Imagine a private conversation that should only be heard by the intended
recipient - that's confidentiality in action. Organizations achieve this through methods
like:
Integrity is about ensuring that information is accurate, authentic, and protected from
unauthorized changes. It's like ensuring that a message sent is the same one received,
without any alterations. To maintain data integrity, organizations may use:
Availability ensures that authorized users can access the information they need when
they need it. It's like making sure a library book is available for borrowing and not
misplaced or locked away. Strategies to ensure data availability include:
● Redundant Systems: Having backups or duplicates of critical systems.
● Regular Maintenance: Updating and patching systems to prevent downtime.
Cybersecurity analysts apply the CIA triad daily to protect their organizations' sensitive
data and systems. Here's how:
Why It Matters
The CIA triad helps create a balanced approach to cybersecurity, where protecting the
secrecy, accuracy, and accessibility of information is paramount. By understanding and
applying these principles, cybersecurity analysts can safeguard their organizations
against a variety of threats, from data breaches to system outages.
Conclusion
For anyone starting in cybersecurity, grasping the CIA triad is essential. It forms the
foundation of how security professionals think about protecting information and
provides a framework for developing effective security measures. As you grow in your
role, these principles will guide your efforts to secure your organization's digital assets.
NIST Frameworks
The National Institute of Standards and Technology (NIST) Cybersecurity Framework
(CSF) is a set of guidelines and best practices designed to help organizations manage
cybersecurity risks. Developed for a broad audience, including businesses and
government agencies, the NIST CSF aims to enhance the security and resilience of
critical infrastructure in the United States and globally.
The framework is structured around five core functions: Identify, Protect, Detect,
Respond, and Recover. Each function plays a crucial role in an organization's
cybersecurity strategy:
By adopting the NIST CSF, organizations can benefit from a high-level, strategic view of
their cybersecurity posture. It provides a common language for internal and external
communication about cybersecurity issues and helps integrate cybersecurity practices
into the organization's risk management processes. The NIST CSF is adaptable to
organizations of all sizes and sectors, offering a flexible approach to enhance
cybersecurity.
A practical example of utilizing the NIST CSF might involve handling a high-risk
notification indicating a compromised workstation. Through the "Identify" function, the
issue is recognized; "Protect" involves blocking unknown devices to prevent further
threat exposure. "Detect" uses tools to find additional threat behaviors. In "Respond," the
situation is investigated to understand the incident's specifics and origins. Finally,
"Recover" involves restoring affected files or data and correcting any damage to ensure
the organization returns to normal operation.
Understanding and applying the NIST CSF's core functions can significantly contribute
to an organization's security strategy, helping to mitigate risks, manage threats, and
ensure a robust response to incidents, with the ultimate goal of maintaining operational
resilience.
OWASP Principles
As an entry-level cybersecurity analyst, it's essential to understand and apply core
security principles from the Open Web Application Security Project (OWASP), which
provides guidelines to improve software security. These principles form the backbone of
effective cybersecurity practices, helping protect organizations against various threats
and vulnerabilities.
Incorporating these OWASP principles into your daily tasks, whether analyzing logs,
monitoring SIEM dashboards, or using vulnerability scanners, strengthens an
organization's defense against cyber threats. By adopting these practices, you
contribute to a security-conscious culture, reducing the risk of breaches and enhancing
the resilience of organizational assets and data.
Security Audits
What is a Security Audit?
Types of Audits
These audits involve a collaborative effort, often including roles like a compliance
officer and security manager. Their goal is to enhance the organization's security stance,
ensuring adherence to legal compliance, thus averting potential fines.
Key Elements of Internal Audits
● Scope and Goals: Defining what the audit will cover and what it aims to achieve.
● Risk Assessment: Identifying potential threats and deciding on security
measures.
● Controls Assessment: Examining the effectiveness of current security measures.
● Compliance Assessment: Verifying adherence to relevant laws and regulations.
● Communication: Sharing audit findings and recommendations with stakeholders.
1. Defining Scope and Goals: Determining the specific areas, policies, procedures,
and technologies to be audited.
2. Conducting a Risk Assessment: Identifying threats, vulnerabilities, and
determining necessary security improvements.
Audits are crucial for pinpointing security weaknesses, ensuring data protection, and
preventing regulatory penalties. They provide a clear path for enhancing security
practices and maintaining a robust security posture.
Frameworks like the NIST Cybersecurity Framework (NIST CSF) and ISO 27000 series
guide organizations in preparing for audits. By aligning with these frameworks and
implementing appropriate controls, organizations can effectively meet compliance
requirements and strengthen their security strategies.
Audit Checklist
SIEM Tools
Navigating the realm of cybersecurity requires an understanding of various tools and
practices, among which Security Information and Event Management (SIEM) tools stand
as critical components. These tools not only gather and analyze log data but also
provide real-time visibility and alerts for potential security incidents. Let's delve into
some foundational elements and functionalities of SIEM tools, emphasizing their role in
safeguarding an organization's digital infrastructure.
SIEM tools collect logs from multiple sources within an organization's network, such as:
● Firewall Logs: Track both incoming and outgoing network traffic, identifying
potential unauthorized access attempts.
● Network Logs: Record the activity of all devices within the network, including the
connections between different devices and services.
● Server Logs: Document events related to essential services like web, email, and
file sharing, including login attempts and user activities.
These tools are indispensable for security teams, enabling them to detect
vulnerabilities, potential data breaches, and other security threats efficiently.
SIEM tools feature dashboards that present complex security data in an easily
digestible format. Similar to how weather apps display climate data, SIEM dashboards
use visuals like charts and graphs to depict security information, aiding analysts in
making swift, informed decisions. For instance, a dashboard could quickly reveal if there
have been numerous login attempts from unusual locations, flagging them as potential
security risks.
Current State
Looking Ahead
The future of SIEM tools promises even greater integration with cloud computing, IoT
devices, and advanced technologies like AI and ML. This evolution aims to enhance
their ability to detect complex threats across an increasingly interconnected digital
landscape. The incorporation of automation and Security Orchestration, Automation,
and Response (SOAR) functionalities will streamline the response to security incidents,
allowing for more efficient mitigation processes.
The cybersecurity community utilizes both open-source and proprietary SIEM tools.
Open-source tools, such as Linux and Suricata, offer customization and collaborative
development advantages. In contrast, proprietary tools like Splunk and Chronicle offer
tailored solutions with dedicated support, albeit at a cost. Each type has its place in an
organization's security strategy, depending on specific needs and resources.
Conclusion
As digital threats evolve, so too must the tools and strategies used to combat them.
SIEM tools are at the forefront of this battle, offering comprehensive solutions for
monitoring, analyzing, and responding to security incidents. Whether through the
detailed analysis provided by tools like Splunk and Chronicle or the adaptable,
community-driven approach of open-source solutions, SIEM technologies remain
essential to maintaining robust cybersecurity defenses in an ever-changing digital
landscape.
Playbooks
Understanding Playbooks
At their core, playbooks are designed to bring structure, efficiency, and consistency to
the incident response process. They ensure that every member of the cybersecurity
team, regardless of individual experience or expertise, can follow a set of established
procedures to address and mitigate incidents effectively.
Types of Playbooks
Cybersecurity is a dynamic field, with threat actors constantly devising new tactics and
techniques. Consequently, playbooks must be regularly reviewed, tested, and updated to
ensure they remain effective against the latest threats. This continuous improvement
process is essential for maintaining an agile and resilient security posture.
Introduction to Assets
Understanding Assets in Cybersecurity
The first step in protecting these assets is thorough asset management, which involves
identifying, tracking, and classifying all assets within an organization. This process
enables security teams to allocate resources effectively and prioritize their efforts
based on the value and sensitivity of each asset.
Asset classification is a critical component of this process, helping organizations to
categorize their assets based on levels of sensitivity and the potential impact of their
compromise. Common classification levels include:
● Public: Assets that can be freely shared with anyone without impacting the
organization.
● Internal-Only: Assets intended for use within the organization and not for public
disclosure.
● Confidential: Sensitive assets that could cause harm to the organization if
disclosed, accessible only to authorized personnel.
● Restricted: Highly sensitive assets subject to the strictest controls, often related
to regulatory requirements or critical business operations.
As the digital landscape continues to evolve, so too does the nature of assets. The shift
towards cloud computing and the Internet of Things (IoT) introduces new categories of
assets and complicates the traditional boundaries between data states (in use, in
transit, and at rest). Security teams must adapt their asset management practices to
account for these changes and ensure comprehensive protection across all types of
assets.
In conclusion, assets are at the core of any cybersecurity strategy. Understanding the
full spectrum of assets within an organization, along with their value and vulnerabilities,
is essential for developing effective security measures. Through diligent asset
management and classification, organizations can build a robust security posture that
protects their most valuable components against the evolving landscape of cyber
threats.
Protecting Assets
Protecting organizational assets in the realm of cybersecurity involves a multifaceted
approach, leveraging a combination of technical, operational, and managerial controls
to safeguard digital, information, physical, and intangible assets against threats and
vulnerabilities.
Digital Assets: Encryption is pivotal in protecting data at rest, in transit, and in use. For
instance, employing Advanced Encryption Standard (AES) for data storage and Secure
Sockets Layer (SSL)/Transport Layer Security (TLS) for data in transit ensures that
sensitive information such as customer data, financial records, and proprietary software
is encrypted and thus, inaccessible to unauthorized users. Implementing firewalls and
antivirus software also plays a crucial role in defending against malware and network
intrusions that threaten digital assets.
Information Systems: Protecting the systems that process, store, and transmit data
requires a combination of intrusion detection and prevention systems (IDPS), regular
security assessments, and the implementation of security patches and updates. This
ensures that vulnerabilities in networks, servers, and end-user devices are promptly
addressed, and potential breaches are detected and mitigated in real-time.
The journey to securing assets begins with a thorough understanding and identification
of vulnerabilities within an organization's systems and networks. This process, often
part of a broader vulnerability management strategy, involves regular scanning and
assessment to detect weaknesses. Tools such as vulnerability scanners automate the
comparison of known vulnerabilities against the organization's technologies, flagging
potential risks for further analysis.
Penetration testing, a simulated cyberattack against your computer system to check for
exploitable vulnerabilities, is a crucial practice. It allows organizations to test the
effectiveness of their security measures in a controlled environment, providing insights
into potential weaknesses and the impact of successful breaches. This ethical hacking
practice helps fine-tune security strategies, ensuring that defenses are not just
theoretical but practically resilient against real-world tactics employed by
cybercriminals.
Threats
Understanding the Threat Landscape
1. Phishing Attacks: Understand that phishing, particularly via email, is one of the
most common and effective social engineering attacks, aiming to steal sensitive
information or deliver malware.
2. Spear Phishing and Whaling: Recognize the increased risk from more targeted
forms of phishing, such as spear phishing and whaling, which aim at specific
individuals or high-level executives with tailored messages.
3. Business Email Compromise (BEC): Be alert to BEC attacks that impersonate
senior executives or trusted partners to initiate fraudulent money transfers or
data theft.
4. Ransomware: Acknowledge the role of social engineering in spreading
ransomware, often through deceptive links or attachments that promise urgent or
enticing information.
Mitigation Strategies
Conclusion
● Understand CISSP Domains: Familiarize yourself with the eight CISSP domains,
focusing on how each domain contributes to risk management.
● Identify Business Context: Choose a business sector of interest (e.g., retail,
healthcare, IT services) and define the scope of your project, including the size of
the business and types of data it handles.
● Asset Identification: List all critical assets that need protection, including digital
assets, physical devices, and data.
● Threat Identification: Identify potential threats to each asset, utilizing resources
like the OWASP Top 10 for web applications, if applicable.
● Vulnerability Assessment: Determine vulnerabilities in assets that could be
exploited by threats. Use checklists or guidelines from sources like NIST or CIS
Controls for a structured approach.
● Risk Analysis: Analyze the likelihood and impact of identified threats exploiting
vulnerabilities. Create a risk matrix to prioritize risks based on their severity.
● Action Plan: Create a step-by-step action plan for implementing the mitigation
strategies, including timelines, responsible parties, and necessary resources.
● Training and Awareness: Outline a training and awareness program for
employees to understand the risks and their roles in the cybersecurity posture of
the organization.
Conclusion:
This project enables you to apply theoretical knowledge from the CISSP domains to a
practical scenario, enhancing your understanding of cybersecurity risk management in a
real-world context. By developing a cybersecurity risk management framework, you not
only learn about the intricacies of protecting organizational assets but also gain insights
into strategic planning and execution of security measures, preparing you for more
advanced roles in cybersecurity.
Resources
Project 2 Template