Introduction To Cybersecurity
Introduction To Cybersecurity
Introduction To Cybersecurity
to Cybersecurity
2
Why do we need cybersecurity?
3
CYBERSECURITY GOVERNANCE
• The typical driver for cybersecurity governance remains the prevention of fraud and
abuse
• Prevention of abuse and fraud have led to increased regulations, standards, and
guidelines.
• Organizations now pay greater attention to governance, which has changed the
dynamics of information security management.
• Computer crimes & cyber attacks are on the rise, many of which are perpetrated using
social engineering techniques.
• Building security awareness into the governance structure has become essential.
• Information security professionals are faced with ever-evolving technologies. These
include sophisticated and determined cybercriminals and a blended threat landscape.
• Even those security practitioners who work in non-regulated environments are
expected to follow a common set of practices, criteria, and standards.
• An understanding of the laws, regulations, and standards that apply to the field of
information security is essential.
• The most common frameworks are the National Institute of Standards and Technology
(NIST) and International Organization for Standardization (ISO 27001 and ISO 27002).
4
CYBERSECURITY CONTROL FAMILIES
(Based on ISO 27001)
• Access Control • Physical and Environmental
Protection
• Awareness and Training
• Planning
• Audit and Accountability
• Personnel Security
• Security Assessment and
Authorization • Risk Assessment
• Configuration Management • System and Services
Acquisition
• Contingency Planning
• System and Communications
• Identification and Protection
Authentication
• System and Information
• Incident Response Integrity
• Maintenance • Program Management
• Media Protection
5
KEY INFORMATION SECURITY CONCEPTS
• Access – A subject of objects ability to use, manipulate, modify, or affect another subject or object.
• Asset – The resources that are being protected - workstation, servers, and network devices.
• Attack – A intentional or unintentional act that can damage or compromise information systems.
• Control, Safeguard, or Countermeasure – The security mechanisms, policies, or procedures that
counter attacks, reduce risk, and resolve vulnerabilities
• Exploit – A technique used to compromise a system.
• Exposure – A state of being exposed when a vulnerability exist.
• Loss – A instance of an information asset suffering damage.
• Risk – The probability of an unwanted experience such as a loss.
• Subject and Object – These people and assets in the IT infrastructure.
• Threat – The danger to an information asset.
• Vulnerability – A weakness or fault in a system or protection mechanism.
6
THE THREE DIMENTIONS OF THE CYBERSECURITY CUBE
Manage Protection
• Domains
• Internet
• Network
Three foundational principles:
• Information States
• Critical Information Characteristics
• Security Measures.
Information states include Transmission, storage, and processing.
Critical Information Characteristics include confidentiality, integrity,
and availability.
Security Measures include technology, policies and practice, and the
education, training, and awareness of people.
7
BALANCING INFORMATION SECURITY AND ACCESS
Manage Access
• Applications
• Data
• Encryption
• Network
8
SECURITY PROFESSIONALS AND THE ORGANIZATION
9
THE CYBERSECURITY KILL CHAIN
11
IMPLEMENTING STRATEGIC CYBERSECURITY GOVERNANCE
12
CRITICAL THINKING FOR SITUATIONAL & OPERATIONAL INTELLIGENCE
Identify Protect Detect Respond Recover
Reconnaissance X
Weaponization
Delivery
Exploitation
Installation
Command &
Control
Actions on
Objectives
Deny Degrade Disrupt Deceive Destroy
13
PUTTING IT ALL TOGETHER
Basic intro to what What does the Enterprise Start working in the field
cyber security is need to do to protect itself
today via People, Process, Tech