Cybersecurity Module 1
Cybersecurity Module 1
[Module 1.2]
How Hackers Obtain your Data
Traditional Data – generated and maintained by
1. Medical Records – contains information
all organizations, big and small.
regarding your physical and mental and
wellbeing. Stored in your Electronic Health a. Transactional Data – details relating
Records (EHRs) to buying and selling.
McCumber Cube (John McCumber, 1991) – help 2. Storage – data stored in a memory or on a
organizations establish and evaluate permanent storage device such as a hard drive,
information security initiatives. solid-state drive or USB drive (data at rest).
Three Dimensions:
3. Transmission – refers to data travelling
1. Foundational Principles for protecting
between information systems (data in transit)
information systems.
2. Protection of information in each of
its possible states.
3. Security measures used to protect The Security Measures Used to Protect Data
data. 1. Awareness, Training and Education –
Foundational Principles for Protecting measure put in place by an organization to
Information ensure that users are knowledgeable about
potential security threats and actions they can
1. Confidentiality – set of rules that prevents take to protect information systems.
sensitive information from being disclosed to
unauthorized people, resources, and processes. 2. Technology – refers to the software and
Methods to Ensure Confidentiality hardware-based solutions designed to protect
a. Data Encryption information systems such as firewalls, which
b. Identity Proofing continuously monitor your network in search of
c. Two Factor Authentication possible malicious incidents.
2. Integrity – ensures that system information 3. Policy and Procedure – refers to the
or processes are protected from intentional or administrative controls that provide information
accidental modification. for how an organization implements
Methods to Ensure Integrity information assurance.
a. Hash Function
b. Checksum
Data Security Breaches
3. Availability – authorized users are able to
access systems and data when and where 1. Persirai Botnet (2017) – an IoT botnet
needed and those that do not meet established targeted over 1,000 different models of Internet
conditions, are not. This can be achieved: Protocol cameras, accessing open ports to inject
a. Maintaining Equipment a command that forced the cameras to connect
b. Performing Hardware Repairs to a site which installed malware on them.
c. Keeping Operating Systems 2. Equifax Inc. (2017) – attackers exploit a
d. Software up to data vulnerability in its web application software to
e. Creating Backups gain access to the sensitive personal data of
millions of customers.
Consequence of a Security Breach b. Hackers – this group of attackers break into
computer systems or networks to gain access.
1. Reputational Damage – security breach can
have a negative long-term impact on an White Hat Attackers – break into
organization’s reputation that has taken years to networks or computer systems to
build. identify any weaknesses so that the
security of a system or network can
2. Vandalism – a hacker or hacking group may
be improved
vandalize an organization’s website by posting
untrue information. Gray Hat Attackers – may set out to find
vulnerabilities in a system but they will
3. Theft – data that involves an incident where
only report their findings to the owners
sensitive personal data has been stolen.
of a system if doing so coincides with
4. Loss of Revenue – financial impact of a their agenda.
security breach can be devastating. A loss of
Black Hat Attackers – take advantage of
customer information may impede company
any vulnerability for illegal personal,
growth and expansion.
financial or political gain.
5. Damaged Intellectual Property – security
c. Organized Hackers – includes organizations of
breach can have a devastating impact on the
cyber criminals, hacktivists, terrorist, and state-
competitiveness.
sponsored hackers.
Purpose of Cyberwarfare