Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY...

25
Muhammad Rizwan Asghar July 30, 2020 INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security

Transcript of Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY...

Page 1: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Slide title

In CAPITALS

50 pt

Slide subtitle

32 pt

Muhammad Rizwan Asghar

July 30, 2020

INTRODUCTION TO

CYBER SECURITY

Lecture 2b

COMPSCI 316

Cyber Security

Page 2: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

2

FOCUS OF THIS LECTURE

Understand computer security

Understand network security

Next, we can build on these two to understand

cyber security

Page 3: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

3

WHAT IS COMPUTER SECURITY?

“Measures and controls that ensure

confidentiality, integrity, and availability of the

information processed and stored by a computer”

Source: National Institute of Standards and Technology (NIST)

Page 4: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

4

THE CIA TRIAD

The CIA triad is formed by three terms:

– Confidentiality (C)

– Integrity (I)

– Availability (A)Confidentiality

Integrity Availability

Page 5: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

5

CONFIDENTIALITY

This term covers two related concepts

– Data confidentiality

– Privacy

Page 6: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

6

DATA CONFIDENTIALITY

Assures that private or confidential

information is not made available or disclosed

to unauthorised individuals

Example

– Student grade information

Page 7: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

7

PRIVACY

Assures that individuals control or influence

what information related to them may be

collected, stored, and shared

Example

– Data generated by smart home devices

Page 8: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

8

INTEGRITY

This term also covers two related concepts

– Data integrity

– System integrity

Page 9: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

9

DATA INTEGRITY

Assures that information and programs are

changed only in a specified and authorised

manner

Example

– Patient’s allergy information stored in a database

by a nurse or doctor

Page 10: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

10

SYSTEM INTEGRITY

Assures that a system performs its intended

function, free from deliberate or inadvertent

unauthorised manipulation of the system

Example

– A compromised machine or a hacked website

Page 11: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

11

AVAILABILITY

Assures that systems work promptly and

services are not denied to authorised users

Example

– A system under Denial of Service (DoS)

Page 12: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

12

SECURITY TERMS

Adversary or attacker

Attack

Countermeasure

Risk

Security policy

System resource or asset

Threat

Vulnerability

Page 13: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

13

ADVERSARY OR ATTACKER

An entity that attacks, or is a threat to, a

system

It could be an individual, agencies, or states

Example

– Hackers

– Governments

Page 14: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

14

HACKER

Black hat hacker

– An individual who attempts to gain unauthorised

access or entry into a system

White hat hacker

– An individual who helps or works with

organisations to strengthen the security of a

system

Page 15: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

15

ATTACK

An action that compromises security of the

system

– E.g., Stuxnet

Inside attack

– Initiated by an entity (i.e., an insider) inside the

security perimeter

Outside attack

– Initiated from outside the perimeter (i.e., an

outsider), by an unauthorised entity

Page 16: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

16

COUNTERMEASURE AND RISK

Countermeasure

– An action, device, procedure, or technique that

reduces a threat, a vulnerability, or an attack by

discovering, eliminating or preventing it

Risk

– The probability that a threat will exploit a

vulnerability with a particular harmful result

Page 17: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

17

SECURITY POLICY

A set of security rules and practices

Specify or regulate how a system or

organisation provides security services

The goal is to protect sensitive and critical

system resources

Page 18: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

18

SYSTEM RESOURCE OR ASSET

Data contained in an information system

A service provided by a system

A system capability

– Processing power

– Communication bandwidth

Page 19: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

19

THREAT AND VULNERABILITY

Threat

– A potential for violation of security

– Could breach security and cause harm

– A possible danger that might exploit a

vulnerability

Vulnerability

– A flaw or weakness in a system’s design,

implementation, or operation and management

that could be exploited

Page 20: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

20

LOSS OF SECURITY

A loss of confidentiality is the unauthorised

disclosure of information

A loss of integrity is the unauthorised

modification or destruction of information

A loss of availability is the disruption of

access to or use of information or services

Page 21: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

21

LEVELS OF IMPACT DUE TO

LOSS OF SECURITY

Low

– Minor damage or harm

– Minor loss

Medium

– Serious adverse effect

– Significant damage or loss

High

– Severe or catastrophic adverse effect

– Major damage or loss

Page 22: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

22

SCENARIOS WITH LOSS OF SECURITY

Confidentiality

– Low impact

– Medium impact

– High impact

Integrity

– Low impact

– Medium impact

– High impact

Availability

– Low impact

– Medium impact

– High impact

Page 23: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

23

SAMPLE QUESTION

The CIA triad of information security includes:

a) Correctness, Information, and Assurance

b) Confidentiality, Integrity, and Authentication

c) Confidentiality, Integrity, and Authorisation

d) Confidentiality, Integrity, and Availability

e) Correctness, Information, and Authorisation

Answer: d

Page 24: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

24

TO BE CONTINUED

See the next lecture

Page 25: Introduction to Cyber Security - Auckland · 2020. 7. 30. · INTRODUCTION TO CYBER SECURITY Lecture 2b COMPSCI 316 Cyber Security. Top right corner for field customer or partner

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

25

Questions?

Thanks for your attention!