Chapter2 - The Cybersecurity Cube
Chapter2 - The Cybersecurity Cube
ITBS101
Lecture 2
Objectives
Dear student, at the end of this lecture you are expected to be able to:
--/-- --/--
Title of the lecture/lesson
Lecture number
Content
CIA TRIAD
States of Data
Cybersecurity Countermeasures
--/-- --/--
Title of the lecture/lesson
Lecture number
Introduction
In this unit, we will introduce the three dimensions of the cybersecurity cube. And, we will describe the CIA TRIAD such as
principles of confidentiality, integrity, and availability. Then, we will learn about states of data. We will also learn about cybersecurity
countermeasures. We will compare the types of cybersecurity countermeasures. Finally, we will describe the ISO cybersecurity model.
--/-- --/--
Title of the lecture/lesson
Lecture number
--/--
The Three Dimensions
Cybersecurity Safeguards
The third dimension of the cybersecurity sorcery cube defines the types
of powers used to protect the cyber world. The sorcery cube identifies
the three types of powers:
Technologies - devices, and products available to protect information
systems and fend off cyber criminals.
Policies and Practices - procedures, and guidelines that enable the
citizens of the cyber world to stay safe and follow good practices.
People - Aware and knowledgeable about their world and the dangers
that threaten their world.
Title of the lecture/lesson
Lecture number
CIA TRIAD
--/--
Confidentiality
Controlling Access
Access control defines a number of protection schemes that prevent
unauthorized access to a computer, network, database, or other data
resources. The concepts of AAA involve three security services:
Authentication, Authorization and Accounting. Authentication verifies the
identity of a user to prevent unauthorized access. Users prove their identity
with a username or I.D.
Authorization services determine which resources users can access, along
with the operations that users can perform. Authorization can also control
when a user has access to a specific resource.
Accounting keeps track of what users do, including what they access, the
amount of time they access resources, and any changes made.
Confidentiality (Cont.)
Integrity Checks
An integrity check is a way to measure the consistency of a collection of data (a file, a picture, or a record). The integrity check
performs a process called a hash function to take a snapshot of data at an instant in time.
Availability
Data availability is the principle used to describe the need to maintain availability of information
systems and services at all times. Cyberattacks and system failures can prevent access to
information systems and services.
Methods used to ensure availability include system redundancy, system backups, increased system resiliency, equipment
maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters.
High availability systems typically include three design principles: eliminate single points of failure, provide for reliable crossover,
and detect failures as they occur.
States of Data
--/--
Data at Rest
The following examples are just a few sources of data that can come from established organizations:
Data transmission involves sending information from one device to another. There are numerous methods to
transmit information between devices including:
The protection of transmitted data is one of the most challenging jobs of a cybersecurity professional. The greatest
challenges are:
Protecting data confidentiality – cyber criminals can capture,
1 save and steal data in-transit.
The third state of data is data in process. This refers to data during initial
input, modification, computation, or output.
Protection of data integrity starts with the initial input of data.
Organizations use several methods to collect data, such as manual data
entry, scanning forms, file uploads, and data collected from sensors.
Each of these methods pose potential threats to data integrity.
Data modification refers to any changes to the original data such as users
manually modifying data, programs processing and changing data, and
equipment failing resulting in data modification.
Processes like encoding/decoding, compression/decompression and
encryption/decryption are all examples of data modification. Malicious
code also results in data corruption
Title of the lecture/lesson
Lecture number
Cybersecurity Countermeasures
--/--
Technologies
A security awareness program is extremely important for an organization. An employee may not be purposefully
malicious but just unaware of what the proper procedures are.
A security policy is a set of security objectives for a company that includes rules of behavior for users and administrators and
1 specifies system requirements. These objectives, rules, and requirements collectively ensure the security of a network, the
data, and the computer systems within an organization.
Standards help an IT staff maintain consistency in operating the network. Standards provide the technologies that specific
2 users or programs need in addition to any program requirements or criteria that an organization must follow.
Guidelines are a list of suggestions on how to do things more efficiently and securely. They are similar to standards, but are
3 more flexible and are not usually mandatory. Guidelines define how standards are developed and guarantee adherence to
general security policies.
Procedure documents are longer and more detailed than standards and guidelines. Procedure documents include
4 implementation details that usually contain step-by-step instructions and graphics.
Activity 2
IT Security Management
Framework
--/--
The ISO Model
ISO/IEC 27000 is an information security standard published in 2005 and revised in 2013. ISO publishes the ISO
27000 standards. Even though the standards are not mandatory, most countries use them as a de facto framework
for implementing information security.
Using the ISO Cybersecurity Model
The ISO 27000 is a universal framework for every type of organization. In order to use the framework effectively, an organization
must narrow down which domains, control objectives, and controls apply to its environment and operations.
The ISO 27001 control objectives serve as a checklist. The first step an organization takes is to determine if these control
objectives are applicable to the organization.
Using the ISO Cybersecurity Model (Cont.)
Chapter Summary
--/--
Conclusion
• This chapter discussed the three dimensions of the cybersecurity sorcery cube. The central
responsibility of a cybersecurity specialist is to protect an organization’s systems and data.
• The chapter explained how each of the three dimensions contributes to that effort.
• The chapter also discussed the ISO cybersecurity model. The model represents an international
framework to standardize the management of information systems.
• This chapter explored the twelve domains. The model provides control objectives that guide the
high-level design and implementation of a comprehensive information security management system
(ISMS).
• The chapter also discussed how security professionals use controls to identify the technologies,
devices, and products to protect the organization.
• If you would like to further explore the concepts in this chapter, please check out the Additional
Resources and Activities page in Student Resources.