Cybersecurity Notes
**1. CIA Triad**
The CIA Triad consists of:
1. Confidentiality: Ensures data is accessible only to authorized individuals,
protecting sensitive information from unauthorized access.
2. Integrity: Ensures the accuracy and reliability of data by preventing
unauthorized alterations.
3. Availability: Ensures that systems, data, and services are accessible when
needed.
**2. Cybercrime vs. Traditional Crime**
Cybercrime: Offenses committed using the internet or digital systems (e.g.,
hacking, phishing).
Traditional Crime: Offenses in the physical world (e.g., theft, assault).
Difference: Cybercrimes leverage technology, often have a global reach, and
can be executed remotely.
**3. Cybersecurity Ethics**
Involves moral principles guiding actions in cybersecurity.
Significance: Prevents misuse of technology, ensures privacy, and builds trust.
**4. Vulnerability vs. Exploit**
Vulnerability: Weakness in a system that can be exploited.
Exploit: The act of taking advantage of a vulnerability.
**5. Social Engineering**
Psychological manipulation of individuals to obtain confidential information
(e.g., phishing).
**6. Ransomware**
Malicious software that encrypts data, demanding payment for decryption.
How it works: Infects via phishing emails or malicious downloads, locks files,
and displays ransom instructions.
**7. Zero-Day Exploit**
A vulnerability exploited before the developer releases a patch.
Implications: High risk as there's no immediate defense.
**Application of Concepts**
1. CIA Triad in Protecting a Customer Database
- Confidentiality: Encrypt sensitive data and use access controls.
- Integrity: Implement checksums and audit trails.
- Availability: Use backups and redundancy systems.
2. Ethics in Cybersecurity for Educational Organizations
- Ensure privacy of student data.
- Develop tools transparently and without malicious intent.
3. Risk Assessment in Cybersecurity
- Steps: Identify threats, assess vulnerabilities, evaluate impact, and prioritize
actions.
4. Encryption for Sensitive Data
- In Transit: Use SSL/TLS protocols.
- At Rest: Encrypt databases and storage systems.
5. Access Control Mechanisms
- Use role-based access control (RBAC) and multi-factor authentication (MFA).
6. Incident Response Planning
- Steps: Preparation, detection, containment, eradication, recovery, and lessons
learned.
7. Cybersecurity Awareness Training
- Educate employees on phishing, strong passwords, and secure practices.
8. Vulnerability Scanning & Penetration Testing
- Scanning: Identifies weaknesses.
- Testing: Simulates attacks to evaluate system defenses.
9. SIEM Systems
- Aggregate and analyze logs to detect and respond to threats.
10. Principle of Least Privilege
- Restrict user access to only what's essential for their role.
**Analysis Topics**
1. Interconnected Devices and Cybersecurity
- Impact: Increases attack surfaces; necessitates stronger defenses.
2. Ethics of Government Surveillance
- Balances security with privacy concerns.
3. AI in Cybersecurity
- Defense: Detects anomalies and automates responses.
- Threat: Can be used for advanced phishing or automation of attacks.
4. Economic Impact of Cybercrime
- Costs include data breaches, operational downtime, and loss of trust.
5. Effectiveness of Regulations
- Assessing frameworks like GDPR and their impact on reducing threats.
6. Securing IoT Devices
- Challenges include lack of updates, weak credentials, and diverse platforms.
7. International Cooperation
- Sharing intelligence and harmonizing laws to combat global cybercrime.
8. Emerging Technologies
- Blockchain: Enhances transparency but can be misused.
- Quantum Computing: May break traditional encryption but introduce
quantum-safe methods.
9. Psychological Factors in Human Error
- Stress, fatigue, and lack of training contribute to mistakes like clicking
phishing links.
10. Evolving Cyber Threats
- Requires adaptive strategies, real-time monitoring, and proactive defenses.