0% found this document useful (0 votes)
24 views4 pages

Cybersecurity Concepts and Strategies

this is for all bsit students
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views4 pages

Cybersecurity Concepts and Strategies

this is for all bsit students
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Security Concepts and Goals

SECURITY CONCEPTS
AND GOALS

SUBJECTS AND OBJECTS OF SECURITY


As IT teams seek to create a layered security environment, they should consider the following
tactics:
 PEOPLE
Employees can create some of the greatest risks to cybersecurity. When they are well
informed, however, they can also be an asset and the first line of defense.
A few of the cyber hygiene points IT teams will want to inform employees of include the
following:
 Creating strong passwords that are unique to each account and not reused
 Ensuring personal and work passwords are separate
 Not opening or clicking links in suspicious e-mails or from unfamiliar senders
 Ensuring applications and operating systems are regularly updated as soon as
patches are released
 Not installing any unknown outside software, as these can open security
vulnerabilities in the network
 Immediately reporting any unusual behavior or something strange happening on
their computers.

 PROCESSES
This layer of cybersecurity ensures that IT teams have strategies in place to proactively
prevent and to respond quickly and effectively in the event of a cybersecurity incident.
Key Security Processes
1. Incident Response Plan (IRP)
2. Backups and Recovery Testing
3. Threat Intelligence and Research
4. Asset Prioritization

 TECHNOLOGY
There are hosts of technologies that security teams can implement to layer their defenses.
It is important that IT teams do not implement isolated point solutions as they layer their
defenses, but rather select those tools based on their ability to be integrated and
automated to create a security fabric that can facilitate the rapid detection and mitigation
of threats.
Key Security Technologies
1. Firewalls & Intrusion Detection/Prevention Systems (IDS/IPS)
2. Endpoint Protection (Antivirus, EDR, XDR)
3. Multi-Factor Authentication (MFA)
4. Encryption
5. Deception Technology
6. Automation and Integration

Advanced Information Security and Assurance – IT413


Security Concepts and Goals

EMERGING TECHNOLOGIES IN CYBERSECURITY


 Hardware authentication - is a well-known fact that a majority of data users’
passwords and usernames are weak. This makes it easy for hackers to get access to the
information systems and compromise sensitive data of a business entity or government
agency.
 Cloud technology - is set to have a significant impact on the transformation of systems
security technology.
 Deep learning - encompasses some technologies like machine learning and artificial
intelligence. There is a significant deal of interest for systems security in these
technologies.

FIVE (5) TYPES OF CYBERSECURITY (SECURITY RENDERED IN THE NETWORK)

 Critical Infrastructure Security


 Application Security
 Network Security
 Cloud Security
 Internet of Things (IoT) Security

SECURITY OBJECTIVES

 Security Policy

A security policy is a set of rules that applies to activities for the


computer and communications resources that belong to an organization. These
rules include areas such as physical security, personnel security, administrative
security, and network security.
When creating and carrying out a security policy, one must have clear
objectives. These objectives must fall into one (1) or more of the following
categories:
 Resource Protection
 Authentication
 Authorization
 Integrity
 Nonrepudiation
 Confidentiality
 Auditing Security Activities

Advanced Information Security and Assurance – IT413


Security Concepts and Goals

IT SECURITY FRAMEWORK

Below are some key frameworks that are widely used in the industry.

 National Institute of Standards and Technology (NIST)


o The Cybersecurity Framework consists of three (3) main components:
 Framework core
 Framework implementation tiers
 Framework profiles
 ISO/IEC – 27000 family
o ISO 27000 includes a six-part approach:
 I. Define a security policy.
 II. Define the scope of the ISMS.
 III. Conduct a risk assessment.
 IV. Manage identified risks.
 V. Select control objectives and controls to be implemented.
 VI. Prepare a statement of applicability.
 Payment Card Industry Data Security Standard (PCI DSS)
o Six (6) categories:
 I. Build and maintain a secure network.
 II. Protect card data.
 III. Maintain a vulnerability program.
 IV. Implement strong access control measures.
 V. Regularly monitor and test networks.
 VI. Maintain an Information security policy

SECURITY ARCHITECTURE

Security architecture is a unified security design that addresses the necessities


and potential risks involved in a particular scenario or environment. It also
specifies when and where to apply security controls. The design process is
generally reproducible.

The key attributes of security architecture are as follows:

 Relationships and Dependencies


 Benefits
 Form
 Drivers
o Risk management
o Benchmarking and good practice
o Financial
o Legal and regulatory

Advanced Information Security and Assurance – IT413


Security Concepts and Goals

THE KEY PHASES IN THE SECURITY ARCHITECTURE PROCESS ARE AS


FOLLOWS:

 Architecture Risk Assessment – This evaluates the business influence of vital business
assets and the odds and effects of vulnerabilities and security threats.
 Security Architecture and Design – This is the design and architecture of security
services, which facilitate business risk exposure objectives.
 Implementation – Security services and processes are implemented, operated and
controlled. Assurance services are designed to ensure that the security policy and
standards, security architecture decisions, and risk management are mirrored in the real
runtime implementation.
 Operations and Monitoring – These are the day by day processes, such as threat and
vulnerability management and threat management. Measures are taken to supervise and
handle the operational state in addition to the depth and breadth of the systems security.

Advanced Information Security and Assurance – IT413

You might also like