Chapter 1-The Cybersecurity Cube
Chapter 1-The Cybersecurity Cube
Chapter 1-The Cybersecurity Cube
CIA Traid:
Most privacy data is confidential, but not all confidential data is private.
Integrity- Integrity is the accuracy, consistency, and trustworthiness of data during its
entire life cycle. Another term for integrity is quality. Methods used to ensure data integrity
include hashing, data validation checks, data consistency checks, and access controls.
Availability- Data availability is the principle used to describe the need to maintain
availability of information systems and services at all times. Methods used to ensure
availability include system redundancy, system backups, increased system resiliency,
equipment maintenance, up-to-date operating systems and software, and plans in place to
recover quickly from unforeseen disasters. One of the most popular high availability
practices is five nines. The five nines refer to 99.999%. This means that downtime is less
than 5.26 minutes per year.
(Eliminate single points of failure, Provide for reliable crossover, Detect failures as they
occur)
States of Data:-
Data at Rest- Stored data refers to data at rest. Data at rest means that a type of
storage device retains the data when no user or process is using it. Direct-attached
storage(DAS). Redundant array of independent disks (RAID) uses multiple hard drives in an
array, which is a method of combining multiple disks so that the operating system sees
them as a single disk. A network attached storage (NAS) device is a storage device
connected to a network that allows storage and retrieval of data from a centralized
location by authorized network users. Cloud storage is a remote storage option that uses
space on a data center provider and is accessible from any computer with Internet access.
Direct-attached storage can be one of the most difficult types of data storage to manage
and control. Direct-attached storage is vulnerable to malicious attacks on the local host.
Data In-Transit- Sneaker net – uses removable media to physically move data from one
computer to another, Wired networks – uses cables to transmit data, Wireless networks –
uses radio waves to transmit data. The cybersecurity professional must deal with several
challenges in protecting this data: Confidentiality, Integrity and Availability
Countermeasures- VPNs, SSL, IPsec, Encryption/Decryption, Hashing, Redundancy, Hot
standby
Data in Process- Protecting against invalid data modification during processing can
have an adverse impact. Software errors are the reason for many mishaps and disasters.
Cybersecurity Countermeasures:-
Network based- VPNs, Network access control (NAC), Wireless access point security
Cloud based- Software as a Service (SaaS), IaaS, PaaS. Cloud service providers have
extended these options to include IT as a Service (ITaaS), which provides IT support for
IaaS, PaaS, and SaaS service models.
Guidelines are a list of suggestions on how to do things more efficiently and securely. They
are similar to standards, but are more flexible and are not usually mandatory. Guidelines
define how standards are developed and guarantee adherence to general security policies.
Risk Assessment, Security Policy, Organization and Info Security, Asset Management,
Human Resource security, Physical and environmental security, Communication and opr
management, (Info System Acquisition, development and maintainance), Access control,
Info security and incident management, Business continuity management, Compliance
Certification and compliance provide confidence for two organizations that need to trust
each other’s confidential data and operations. Compliance and security audits prove that
organizations are continuously improving their information security management system.
Most organizations generate a document called the Statement of Applicability (SOA). The
SOA defines which control objectives that the organization needs to use. Different
organizations place greater priority on confidentiality, integrity, and availability depending
on the type of industry. For example, Google places the highest value on user data
confidentiality and availability and less on integrity. Google does not verify user data.
Amazon places high emphasis on availability. If the site is not available, Amazon does not
make the sale. This does not mean that Amazon ignores confidentiality in favor of
availability. Amazon just places a higher priority on availability. Therefore, Amazon may
spend more resources ensuring that there are more servers available to handle customer
purchases.