Security Concepts and Goals
SECURITY CONCEPTS
AND GOALS
SUBJECTS AND OBJECTS OF SECURITY
As IT teams seek to create a layered security environment, they should consider the following
tactics:
PEOPLE
Employees can create some of the greatest risks to cybersecurity. When they are well
informed, however, they can also be an asset and the first line of defense.
A few of the cyber hygiene points IT teams will want to inform employees of include the
following:
Creating strong passwords that are unique to each account and not reused
Ensuring personal and work passwords are separate
Not opening or clicking links in suspicious e-mails or from unfamiliar senders
Ensuring applications and operating systems are regularly updated as soon as
patches are released
Not installing any unknown outside software, as these can open security
vulnerabilities in the network
Immediately reporting any unusual behavior or something strange happening on
their computers.
PROCESSES
This layer of cybersecurity ensures that IT teams have strategies in place to proactively
prevent and to respond quickly and effectively in the event of a cybersecurity incident.
Key Security Processes
1. Incident Response Plan (IRP)
2. Backups and Recovery Testing
3. Threat Intelligence and Research
4. Asset Prioritization
TECHNOLOGY
There are hosts of technologies that security teams can implement to layer their defenses.
It is important that IT teams do not implement isolated point solutions as they layer their
defenses, but rather select those tools based on their ability to be integrated and
automated to create a security fabric that can facilitate the rapid detection and mitigation
of threats.
Key Security Technologies
1. Firewalls & Intrusion Detection/Prevention Systems (IDS/IPS)
2. Endpoint Protection (Antivirus, EDR, XDR)
3. Multi-Factor Authentication (MFA)
4. Encryption
5. Deception Technology
6. Automation and Integration
Advanced Information Security and Assurance – IT413
Security Concepts and Goals
EMERGING TECHNOLOGIES IN CYBERSECURITY
Hardware authentication - is a well-known fact that a majority of data users’
passwords and usernames are weak. This makes it easy for hackers to get access to the
information systems and compromise sensitive data of a business entity or government
agency.
Cloud technology - is set to have a significant impact on the transformation of systems
security technology.
Deep learning - encompasses some technologies like machine learning and artificial
intelligence. There is a significant deal of interest for systems security in these
technologies.
FIVE (5) TYPES OF CYBERSECURITY (SECURITY RENDERED IN THE NETWORK)
Critical Infrastructure Security
Application Security
Network Security
Cloud Security
Internet of Things (IoT) Security
SECURITY OBJECTIVES
Security Policy
A security policy is a set of rules that applies to activities for the
computer and communications resources that belong to an organization. These
rules include areas such as physical security, personnel security, administrative
security, and network security.
When creating and carrying out a security policy, one must have clear
objectives. These objectives must fall into one (1) or more of the following
categories:
Resource Protection
Authentication
Authorization
Integrity
Nonrepudiation
Confidentiality
Auditing Security Activities
Advanced Information Security and Assurance – IT413
Security Concepts and Goals
IT SECURITY FRAMEWORK
Below are some key frameworks that are widely used in the industry.
National Institute of Standards and Technology (NIST)
o The Cybersecurity Framework consists of three (3) main components:
Framework core
Framework implementation tiers
Framework profiles
ISO/IEC – 27000 family
o ISO 27000 includes a six-part approach:
I. Define a security policy.
II. Define the scope of the ISMS.
III. Conduct a risk assessment.
IV. Manage identified risks.
V. Select control objectives and controls to be implemented.
VI. Prepare a statement of applicability.
Payment Card Industry Data Security Standard (PCI DSS)
o Six (6) categories:
I. Build and maintain a secure network.
II. Protect card data.
III. Maintain a vulnerability program.
IV. Implement strong access control measures.
V. Regularly monitor and test networks.
VI. Maintain an Information security policy
SECURITY ARCHITECTURE
Security architecture is a unified security design that addresses the necessities
and potential risks involved in a particular scenario or environment. It also
specifies when and where to apply security controls. The design process is
generally reproducible.
The key attributes of security architecture are as follows:
Relationships and Dependencies
Benefits
Form
Drivers
o Risk management
o Benchmarking and good practice
o Financial
o Legal and regulatory
Advanced Information Security and Assurance – IT413
Security Concepts and Goals
THE KEY PHASES IN THE SECURITY ARCHITECTURE PROCESS ARE AS
FOLLOWS:
Architecture Risk Assessment – This evaluates the business influence of vital business
assets and the odds and effects of vulnerabilities and security threats.
Security Architecture and Design – This is the design and architecture of security
services, which facilitate business risk exposure objectives.
Implementation – Security services and processes are implemented, operated and
controlled. Assurance services are designed to ensure that the security policy and
standards, security architecture decisions, and risk management are mirrored in the real
runtime implementation.
Operations and Monitoring – These are the day by day processes, such as threat and
vulnerability management and threat management. Measures are taken to supervise and
handle the operational state in addition to the depth and breadth of the systems security.
Advanced Information Security and Assurance – IT413