CYB_201 FINAL
CYB_201 FINAL
Access Control Policy: Details who can access specific resources and
how access is granted or revoked.
Best Current Practices (BCPs): These are guidelines and actions that help
enhance security across various aspects of an organization. BCPs include:
4. Access Control
Access Control: A core security function that restricts user access based on
permissions, roles, and policies. Access control mechanisms include:
5. Basic Cryptography
Access Control and Testing: Limit and verify user access, and
continually assess security controls to prevent breaches.
1. Evolution of Cyber-Attacks
5. Cryptography
6. Steganography
Steganography hides data within other media (like images, audio, or text) to
conceal its presence rather than encrypt its contents. Unlike cryptography,
steganography is focused on hiding the existence of the message rather than
securing it. It is often used for covert communication and can sometimes
evade detection by traditional security tools.
Securing networks and distributed systems is critical as they are the primary
infrastructure supporting most digital services:
Best Current Practices (BCPs): These are guidelines and actions that help
enhance security across various aspects of an organization. BCPs include:
4. Access Control
Access Control: A core security function that restricts user access based on
permissions, roles, and policies. Access control mechanisms include:
5. Basic Cryptography
Access Control and Testing: Limit and verify user access, and
continually assess security controls to prevent breaches.
CYBER ATTACK
1. Evolution of Cyber-Attacks
5. Cryptography
Cryptography secures data by making it unreadable to unauthorized parties:
6. Steganography
Steganography hides data within other media (like images, audio, or text) to
conceal its presence rather than encrypt its contents. Unlike cryptography,
steganography is focused on hiding the existence of the message rather than
securing it. It is often used for covert communication and can sometimes
evade detection by traditional security tools.
Securing networks and distributed systems is critical as they are the primary
infrastructure supporting most digital services:
Preventive Countermeasures
Detective Countermeasures
Responsive Countermeasures
3. Emphasis on Resilience:
2. ISO/IEC 27001:
3. CIS Controls:
EVOLUTION OF CYBERSECURITY
Main Characteristics:
Famous Attack (1980s): The "Morris Worm" (1988) is one of the first
significant cybersecurity incidents. It spread across the internet,
exploiting vulnerabilities in Unix systems, and resulted in an estimated
$10 million in damages.
Main Characteristics:
As the internet grew, so did the opportunities for malicious actors. The 1990s
saw the emergence of new forms of malware, such as viruses and worms,
which spread through email, floppy disks, and early websites. Hackers and
cybercriminals began to understand the financial potential of attacking
systems and stealing data.
Main Characteristics:
Main Characteristics:
Main Characteristics:
Notable Regulations:
Notable Regulations:
Notable Regulations:
Notable Regulations:
Notable Regulations:
Notable Regulations:
Conclusion
2. Cybercriminals
3. Hacktivists
6. Terrorist Organizations
Some actors in cyberspace are simply individuals acting alone, often for
personal satisfaction, fame, or experimentation. They may not necessarily
have malicious intent but can still engage in activities that cause harm.
International bodies and NGOs often help to set policies, provide guidance,
and facilitate cooperation in cyberspace.
Key Takeaways
State actors tend to be the most influential, with vast resources and
global reach.
Cybercriminals focus on financial gain, often with advanced
techniques like ransomware.
Hacktivists and terrorist organizations are more ideologically
driven, using cyberspace for social or political causes.
Private sector actors, including cybersecurity professionals, focus on
defending and securing cyberspace.
International organizations strive to manage and regulate the
space for global stability and security.
2. Privacy
1. Networks
2. Protocols
Common Protocols:
3. Operating Systems
4. Applications
Types of Applications:
1. Social Engineering
o Attackers manipulate people into divulging confidential
information or performing actions that compromise security (e.g.,
spear phishing, pretexting, baiting).
2. Exploitation of Vulnerabilities
o Attackers target known (or zero-day) vulnerabilities in software,
hardware, or network configurations to gain unauthorized access
or elevate privileges.
3. Malware
o Viruses, worms, trojans: Software designed to damage or gain
unauthorized access to systems, often installed through phishing
emails, malicious websites, or infected software downloads.
o Keyloggers: Malware that records keystrokes to steal sensitive
information like passwords.
4. Denial-of-Service (DoS) and Distributed Denial-of-Service
(DDoS)
o Attackers flood a system or network with excessive traffic to
overwhelm resources and cause disruptions. These attacks often
use botnets to generate large amounts of traffic.
A. Preventive Measures
Preventing cybersecurity incidents focuses on reducing the attack surface,
improving security posture, and ensuring secure behaviors within the
organization.
B. Detective Measures
C. Corrective Measures
5. Respecting Privacy
9. Non-Discrimination
1. Buffer Overflow
5. Insecure Deserialization
6. Broken Authentication
8. Command Injection