Uel CN 7014 Reading Material Week 1
Uel CN 7014 Reading Material Week 1
Uel CN 7014 Reading Material Week 1
The material for Week 1 will be an introduction and review of the fundamental concepts and
principles of security. This is an important step to take when covering new topics in the
subject area. By solidifying and refreshing your knowledge and understanding of these
concepts, you will be able to contextualise their relevance and application in new knowledge
areas. The last section of this week’s material will be provide you with an overview of the
o Types of security
Solidify knowledge and understanding of the core aspects, concepts and principles of
security
Describe and analyse the core aspects, concepts and principles of security in the
“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained
The challenge that faces everyone working in the field of Information Security and
cybersecurity is the need to be knowledgeable and up-to date with ongoing security threats
and trends that are a result of an evolving Information Age. By being aware of these threats
and trends, security specialists can be properly prepared to adapt one’s security position.
Although the types of security threats that currently exist are not new, the nature of these
threats are determined by the environment in which they operate. The current COVID-19
pandemic has resulted in a significant shift in the nature and quantity of cyber threats. Due to
lockdown measures, many individuals are forced to spend more time at home and
organisations are increasingly shifting their operations heavily towards remote work. The use
of computers in this ‘home’ setting has increased (Lallie et al., 2021). Some of the key cyber
Data security – reduced compliance to data processing and storage due to remote and
cloud services
In general, the term ‘security’ is the ‘state of being secure’, defined by the Merriam-Webster
dictionary “to relieve from exposure to danger or “act to make safe against adverse
contingencies” (Security, 2021). In the traditional sense and without the existence of any of
the modern information and communications technology, security would simply be a set of
methods that can be used by individuals and organisations to protect themselves and any
objects, possessions, resources or interests they deem valuable. The primary objectives of
TYPES OF SECURITY
software, resources, information systems, assets and infrastructure from potential threats.
PHYSICAL SECURITY
The physical resources of an organisation include personnel, hardware assets and other
infrastructure such including buildings, servers or office space. The goal of physical security
OPERATIONS SECURITY
The intention for any successful business or organisation is their ability to operate and
conduct daily tasks at an acceptable level (without disruption). The goal of operations
security is to ensure this level of continuity at all times, especially in the event of a cyber-
COMMUNICATIONS SECURITY
technology to carry out their daily tasks and activities. These organisations leverage these
technologies for communication and productivity via email, video chat, instant messaging or
web browsing. The security threats that exists due to the use of these tools mainly concerns
communications security is to protect this content and information from the following threats:
Unauthorised access
Intentional misuse
Unintentional misuse
Malicious cyber-attacks.
NETWORK SECURITY
Network technologies have transformed the way organisations communicate and share
resources between devices such as desktop computers, laptops and smartphones. With the
existence of internal and external networks, personnel within the organisation can
communicate, exchange and share information and data on their devices locally and remotely.
Communication on networks connected to the internet can cause a range of potential cyber
threats. The majority of these threats are cyber-attacks that work only on the networked
medium. Network Security is the all-encompassing software and hardware strategies used to
prevent threats:
cyber threats
Information Security (InfoSec) as described by the NIST SP 800-12 Rev.1 is ‘The protection
of information and information systems from unauthorized access, use, disclosure, disruption,
focuses on the key security principles of: (a) confidentiality, (b) integrity and (c)
availability. These principles, commonly referred to as the C.I.A Triad are the fundamental
CONFIDENTIALITY
Confidentiality refers to the aspect of Information Security where access to information
Configuration of user access controls and access rights to information and data
INTEGRITY
state and be free from unauthorized modification, corruption or damage. The integrity of
The use of integrity checking tools and software (i.e. hashing, checksum) that can
detect and determine if, when and whether files have been altered in any way
Developing effective security measures, policies and controls to reduce the risk that
modified data
10
organisation led activity. The idea of information availability implies that information should
be accessible and in a useable state when needed. To clarify this point, an authorised user
expect uninterrupted use and access. A common form of reduced availability of information
cyber-attack.
Prevention and mitigation of cyber threats using software security including anti-
There are notable extensions to the C.I.A. Triad are known as AAA (Chapple, Stewart and
Identification: when a user has access to a computer system or resource, they must
given the facility to prove their identity (i.e. that they are who they say they are)
11
Auditing: any computer system or resource that a user has access to should be able to
log information concerning activity in the event forensic analysis or a security audit
systems and resources should be held accountable for their actions whether intentional
or unintentional
The table below is a summary of the key terminology associated with the C.I.A. Triad. These
can be considered as additional elements of the C.I.A. Triad, which are still important in
12
Availability Accessibility
The use of computer systems and resources should be available to anyone
regardless of any limitations they may have
Timelessness
Computer systems and resources should be available whenever needed
Figure 3 – Associated terminology of the C.I.A. Triad (Chapple, Stewart and Gibson, 2018, pp. 2-12)
13
tasked with setting goals and objectives that they wish to achieve in a specific timeframe and
with a specific set of resources. Whitman and Mattford (2014, pp. 8-9) describe three main
roles of a manager:
CHARACTERISTICS OF M ANAGERS
According to Popular Management Theory (POLC), effective managers employ good skills
used to achieve goals and objectives. Planning can be further split into the following
categories:
available set of resources to achieve goals and objectives. Organising can include
14
Leading: one of the more critical tasks that a manager has to do well to ensure that
personnel are being positively steered and motivated to accomplish their tasks and
activities.
Controlling: A manager needs to actively monitor that all activities are progressing
as intended and to make the appropriate adjustments in the event that an activity is not
Problem solving: A key skill that managers need to have is an ability to effectively
solve problems and develop solutions that can reduce or eliminate them.
The interlink between the roles of managers and the characteristics of management is
15
The goals of the Information Security management team is to focus on assuring the three
elements of the C.I.A. Triad. This is done with effective planning, development of
2014, pp. 13-16). The principles of Information Security management are summarised below.
1. Planning: Ensuring the alignment of the overall business strategy with the IT
strategy. The goal of planning for Information Security management is to ensure that
2. Policy: The development of a set of guidelines that govern the behaviour and use of
goals. Policies can either be Enterprise Information Security policy (EISP), Issue-
Mattford, 2014, p. 14). Examples of such policies are Access Control policies, Data
commonly used Security Awareness Training which provides personnel with the
education and knowledge needed to understand the existing cyber threats, the
16
strategies such as risk management, incident response, disaster recovery and cyber
threat intelligence.
5. People: The security management team is segmented and built with the appropriate
level and separation of skills to carry out and achieve overall security outcomes.
ensure the continual alignment and progress towards goals and objectives. Project
17
The section below is a summary of all the topics that have been covered in the reading
Security refers to the strategies and mechanisms that organisations use to protect their
Protecting the elements from the C.I.A. Triad is fundamental in achieving Information
2. Integrity - assuring that information and data is accurate, valid, complete and
needed
Identification - users can identify themselves when using systems and resources
Authentication - users can prove their identify when using systems and resources
Authorisation - users are provided with specific access rights and privileges when
Auditing - a computer system can trace and log activity in the event of a cyber-attack
or if an audit is required
Accountability - users can be held responsible for their actions and activities on the
interpersonal and decisional roles to achieve goals and objectives. They are responsible for a
variety of tasks including planning, organising, leading, controlling, and solving problems
Information Security management is the process of assuring the elements of the C.I.A.
19
People - building a security team with the required skills needed to achieve security
outcomes
20
Bosworth, S, Kabay, M.E & Whyne, E., 2014. Computer Security Handbook. 6th ed. NJ:
Brooks, C.J et al., 2018. Cyber Security Essentials. : John Wiley and Sons, Inc.
Chapple, M, Stewart, J.M & Gibson, D., 2018. CISSP Certified Information Systems Security
Professional: Official Study Guide. 8th ed. Indianapolis: John Wiley and Sons Inc.
Lallie, H., Shephard, L., Nurse, J., Erola, A., Epiphaniou, G., Maple, C. and Bellekens, X.,
2021. Cyber security in the age of COVID-19: A timeline and anylysis of cyber-crime and
NIST – Computer Security Resource Center. 2021. InfoSec - Glossary. [online] Available at:
Sutton, D., 2017. Cyber Security - A Practitioner's Guide. Swindon: BCS Learning &
Development Ltd.
Whitman, M. and Mattford, H., 2014. Management of information security. 4th ed. Stamford:
Cengage Learning.
21