Cyber Security Flashcards
What is Information Security?
Information security is the preservation of confidentiality, integrity and availability of information.
- Confidentiality:
- The property that information is not disclosed to unauthorised individuals, entities or processes
- Integrity:
- The property of safeguarding the accuracy and completeness of assets
- Availability:
- The property of being accessible and usable upon demand by an authorised entity
Asset
Anything that has value to the organisation, its business operations and its continuity
Threat
A potential cause of an incident that may result in harm to a system or organisation
Vulnerability
A weakness of an asset or group of assets that can be exploited by one or more threats
Impact
The result of an information security incident, caused by a threat, which affects assets
Risk
The potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organisation
Information Security definitions and terminology:
. Preservation of confidentiality, integrity and availability of information.
* Assets; Threats; Vulnerabilities; Impacts; Risks.
Information System assets:
- Primary assets: Business processes & activities; Information.
- Supporting assets: Hardware; Software; Network; Personnel; Site; Organisation’s structure.
Information Security Governance
Information Security Governance refers to the framework, policies, procedures, and processes that an organization implements to manage and oversee its information security efforts effectively. It involves establishing structures and mechanisms to ensure that information assets are protected in line with the organization’s goals, objectives, and risk tolerance.
- How organisations control, direct communicate their cybersecurity risk management activities
- Policies, Standards, Guidelines and Procedures
- Security, Education, Training and Awareness (SETA)
- Incident Response
Assets
- Primary assets:
* Business processes & activities
* Information - Supporting assets
(on which the primary assets rely)- Hardware
- Software
- Network
- Personnel
- Site
- Organization’s structure
Each component has its own strengths and weaknesses, and each has its own security requirements
Information
- Business critical information for the exercise of the organisation’s mission
- Personal information, as can be defined specifically in the sense of the national laws regarding privacy
- Strategic information required for achieving objectives determined by the strategic orientations
- High-cost information whose gathering, storage, processing and transmission require a long time and/or involve a high acquisition cost
Business Processes
- Processes that contain secret processes or processes involving proprietary technology
- Processes that, if modified, can greatly affect the accomplishment of the organisation’s mission
- Processes that are necessary for the organisation to comply with contractual, legal or regulatory requirements
- Business processes/procedures (i.e., documented instructions to accomplish a certain task) are often overlooked
- They are information assets in their own right
Hardware
- This is the physical technology that
* houses and executes the software
* stores and carries the data
* provides the interface for data
entry/removal from the system - Traditional physical security like locks and keys restrict access to and the interaction with the hardware components
- Securing the physical location of the hardware is important as physical access may mean info can be extracted
Software
- The software component of IS comprises
* applications
* operating systems
* assorted command utilities - It’s arguably the most difficult IS component to secure
- Unfortunately, software development is often under resourced
- As such, information security is usually only added as an afterthought rather than being embedded as an integral part
- The exploitation of software errors in software programming accounts for a substantial proportion of attacks on information
Networks
Component that increased need for information security; challenges emerge as information systems are increasingly interconnected
- Manage the network perimeter
* Use firewalls
* Prevent malicious content - Protect the internal network
* Segregate network
* Secure wireless access
* Enable secure administration
* Configure the exception handling processes
* Monitor the network
* Assurance processes
Personnel
Often overlooked in computer security considerations, but people make mistakes, fall victim of social engineering, may susceptible to
bribery/blackmail
- Produce a user security policy
- Establish a staff induction process
- Maintain user awareness of the security risks faced by the organisation
- Support the formal assessment of security skills
- Monitor the effectiveness of security training
- Promote an incident reporting culture
- Establish a formal disciplinary process
Policies, Standards, Guidelines and Procedures
- Policy A principle or rule to guide decisions and achieve rational outcomes
- Standards Detailed statements, quantifying what must be done to comply with policy
- Guideline A set of recommended actions to assist in complying with policy
- Procedure A list of steps that constitute instructions for performing some action or accomplishing some task
Disseminating Policies:
- Policies should be promoted/supported by a security education, training, and awareness (SETA) programme that helps employees do their jobs securely
- Education:
* Not everyone needs formal degree or
certificate in info security
* But some roles may require certain
employees to hold/attain info security
academic qualifications or industry certification - Training:
- EVERYONE in an organisation needs to be trained and aware
of information security - Provides employees with hands-on instruction and detailed
info designed to prepare them to perform duties securely - Management of info security can develop customised in-house
training or outsource training - Awareness:
- keeps info security at forefront of the user’s mind
- can be as simple as security posters, newsletters, flyers, etc
- may include printed mouse-pa
What is cryptography?
Cryptography is a way of turning plaintext (our secret message) into ciphertext (an unreadable version that can later be turned back into the plaintext).
Encrypting something links four elements together:
* the plaintext m
* the ciphertext c
* the key k (like a password)
* the algorithm E
The encryption algorithm turns the plaintext into the ciphertext by means of the key; so
c = Ek (m)
Principles of modern cryptography
Modern algorithms (some of which we shall look at) abide by the following principles:
1. Large enough key space to resist exhaustive search
2. Resistant to frequency analysis
3. Small change in plaintext results in large change in ciphertext
4. Security depends only on secrecy of key, and not on secrecy of algorithm (Kerckhoff’s principle)
Cryptographic Algorithms
Come in two broad categories: symmetric and asymmetric:
- Symmetric encryption uses the same “secret key” to encipher and decipher message
- Encryption methods can be extremely efficient, requiring minimal processing
- Both sender and receiver must possess encryption key
- If either copy of the key is compromised, an intermediate can decrypt and read messages
- Asymmetric encryption (public-key encryption) uses two different but related keys to encrypt/decrypt messages:
- If Key A encrypts message, only Key B can decrypt
- Highest value when one key serves as the private key and the other serves as the public key
- Typically used to encrypt a symmetric session key rather than the plaintext message(s)
Symmetric cryptography, Asymmetric cryptography
- Symmetric cryptography same key (shared by two or more parties) used to encrypt and decrypt, e.g., AES.
Hybrid approach utilises advantages of both - Asymmetric cryptography two different keys: secret key (known to only one party) used to decrypt messages that were encrypted using the public key (known to all), e.g., RSA. Enables the creation of digital signatures.
Caesar Cipher
- Shift the outer wheel on by k letters
- Encrypt: Find each plaintext letter in outer wheel and replace with letter below.
- Decrypt: Find each ciphertext letter in inner wheel and replace with letter above.
ELSE
* Label A=0, B=1, C=2, etc
* Choose 0 ≤ k < 25
* Encrypt: Add k to each numeric value of
plaintext (mod 26)
* Decrypt: Subtract k from each numeric
value of ciphertext (mod 26)
Substitution and Transposition
Substitution: substitute one value for another:
Mono-alphabetic cipher (uses only one alphabet)
* Each given input letter always substitutes to
the same output letter
* E.g., A7→K, B7→Y, …, Z7→S
* Decrypting is done by reversing the
substitution/mapping
Polyalphabetic (uses two or more alphabets)
* E.g., Vigen`ere cipher: a polyalphabetic code; made up of different Caesar ciphers
Transposition: rearranges values within a block