Week 2 - Intro to CSG
Week 2 - Intro to CSG
ITSS 4362
Learning Objectives
• Understand the context Cybersecurity
• Cybersecurity defined
• Cybersecurity Focus
• Cost of Cybercrimes
• Goal of Cybersecurity
• CIA Triad (Confidentiality / Integrity / Availability)
• Threats and Vulnerabilities
• Threat Landscape
• Attack Vectors
• Organizational Safeguards
• Cybersecurity Awareness
• Cybersecurity Statistics
• Cybersecurity Governance
Cyber Breaches
What
• Online retailer of custom mugs and apparel was hacked for a four-month period in the latter half of
2018
How
Theft
• Hackers were able to steal full payment card details (number, security code, and expiration date),
names, addresses, phone numbers, email addresses, and postal codes.
Impact
• While the company didn’t say how many clients were affected, reported in the tens of thousands, given
the amount of transactions that occurred on the website during the months-long breach.
Cyber Breaches
What
How
• A preliminary investigation found that the virus bypassed multiple layers of security, and that the infected
computer — which stored confidential documents on clients — interacted with Russia-based IP addresses.
Theft
• The attacker was able to access names, social security numbers, dates of birth, addresses, health information,
benefit information and other personal information such as income.
Impact
What
How
• A vulnerability on the health network’s website server exposed protected health information
including names, medical record numbers, and a description of each individual’s information.
Theft
Impact
• City of Tallahassee
How
• The out-of-state, third-party vendor that hosts the city's payroll services was hacked and as a result the direct deposit
paychecks were redirected. Employees throughout the city’s workforce were affected.
Theft
• City officials responsible for investigating the incident suspect the cyberattack came from a foreign nation.
Impact
• Nearly $500,000 of the city of Tallahassee employees’ payroll was stolen by hackers who redirected direct deposits into an
unauthorized account.
Cybersecurity Defined
Reputation
• May harm the reputation of an organization in the eyes of their customers / clients / among
competitors / partners / businesses/ government agencies
Legal
• May result in violation of laws or contract requirements
• Risk of prosecution, financial penalties, or withdrawal of existing and future funding
Economic
• May undermine the ability to capitalize on potential intellectual property or knowledge transfer
Operational
• May disrupt normal operations and result in significant remedial cost
Evolution of Technology vs Cyber Threats
Cybersecurity and Emerging Technologies
Internet of Things
Executive
Approve
Executive Mgmt/
Leadership CIO
Human
Implement Operations Resources
Datacenter
Holistic Cybersecurity Governance Program
Quality
Assurance /
Quality
Control
Risk Adherence to
Management LRRs
Governance
Program
Process
Adherence
Audits
and
Oversight
Education
and
Socialization
Goal of this course
- Understanding of the importance of Cybersecurity and
Governance programs in relation to organizational goals.