Types of confidential info
- HR data - employee salaries, perks, data, medical info
- Client/customer data
- Profits
- Contracts
- Trade secrets
CIA triad
- Confidentiality makes sure only authorised parties with sufficient privileges can view sensitive info, this is usually done with encryption. If unauthorized individuals can access and view confidential data, confidentiality is breached.
- Integrity makes sure stored data has no been altered by malicious people or software, methods to keep integrity include error checking methods such as check sums and file hashing. If data is modified without authorization, integrity is compromised.
- Availability makes sure data is easy to read and readily available out for authorised individuals. If users cannot access the system or data when needed, availability is affected.
The importance of maintaining CIA
- maintains trust with stakeholders, as it promotes a positive brand image
- avoids security risks and unauthorised access
The consequences of not maintaining CIA
- Financial issues such as fines
- legal issues such as lawsuits
- reputational issues such as brand damage leading to loss of clients
Identification, Authentication, Authorisation, and Accountability (IAAA)
- IAAA is used to support the CIA security concept, they are a set of primary concepts that aid in understanding computer and network security as well as access control
- Identification and Authentication provide a way of identifying users, typically by using a User-ID/Password combo
- Authorisation is the process that determines what a user can do
- accounting keeps track of a users activity
Access Control Lists (ACL)
- an ACL contains rules that allow or deny access to certain users
- Filesystem ACLs tell the OS which users can access the system and what privileges they have
- Networking ACLs filter access to the network
- Discretionary ACLs (DALCs) identify trustees tat are allowed or denied access to a securable object
- System ACLs (SALCs) enables admins to log attempts to access a secured object
Technical threats
- botnets - type of malware that allows cyber criminals to hijack digital systems without the users knowledge
- DoS - an attempt to make a digital or network system unavailable to its users
- DDoS - a DoS attack where the hacker uses many digital systems to perform to attack
- hacking - eg cross site scripting, password cracking software, SQL injection
- malware
- malicious spam
non technical threats
- Human error
- malicious employees
- disguised criminals
- natural disasters
Technical vulnerabilities
- weak or outdated encryption
- out of date software/hardware/firmware
- incompatibility of legacy systems
- weak passwords
- missing authentication
- exploitable/zero day bugs
non technical vulnerabilities
- Employees
- Poor data/cyber hygiene - making sure data is up to date
- Physical access controls - eg door locks
Risk mitigation
- following National Cyber Security Centre's (NCSC) Cyber Essentials guidelines to help prevent cyber attack
- Anti-virus and Anti-malware
- Firewalls
- Intrusion detection and prevention systems
- encryption
- user access, policies, and procedures (eg passwords and usernames, mfa)
- staff training
- backups
- software maintenance
- Air gaps - having offline parts of the network that cant be hacked
- VPNs
Comments
Post a Comment