0% found this document useful (0 votes)
21 views4 pages

_Basic Security Concepts

Uploaded by

aminaashraf1101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views4 pages

_Basic Security Concepts

Uploaded by

aminaashraf1101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Basic Security Concepts

1. Security Objectives (CIA Triad)

The CIA Triad ensures the security of information systems and data. It consists of
Confidentiality, Integrity, and Availability:

a) Confidentiality

 Definition:
Ensures that information is accessible only to those who are authorized to access it.
Protects sensitive data from unauthorized disclosure.
 Techniques to Ensure Confidentiality:
1. Encryption: Converts plain text into unreadable ciphertext using algorithms and
keys.
 Symmetric Encryption: Uses a single key for both encryption and
decryption.
 Example: AES (Advanced Encryption Standard).
 Asymmetric Encryption: Uses a public key for encryption and a private
key for decryption.
 Example: RSA (Rivest-Shamir-Adleman).
2. Access Control Mechanisms: Restrict access to sensitive information based on
roles or policies.
 Example:
 A payroll database accessible only to HR personnel.
 Multi-factor authentication (MFA) enhances access security.
 Real-World Example:
Online banking uses HTTPS, which encrypts the data exchanged between users and the
bank servers to ensure confidentiality.

b) Integrity

 Definition:
Ensures that information is accurate and unaltered unless explicitly authorized. Prevents
unauthorized modifications to data during storage or transmission.
 Key Concepts:
1. Checksums and Hashing:
 Hashing algorithms (e.g., MD5, SHA-256) generate unique digital
signatures for data. Even minor changes to the data will produce a
different hash value.
 Example: Verifying file integrity when downloading software.
2. Digital Signatures:
 Provides integrity and authenticity by verifying that the sender is genuine.
 Example: Signed emails to ensure the content is not altered.
3. Audit Logs:
 Record system changes, ensuring that any unauthorized alterations are
traceable.
 Real-World Example:
Financial transactions rely on data integrity to prevent fraudulent activity. For instance,
blockchain technology ensures transaction immutability.

c) Availability

 Definition:
Ensures that systems, applications, and data are accessible to authorized users when
needed, without unnecessary delays.
 Key Techniques:
1. Fault Tolerance: Redundant systems or hardware minimize downtime during
failures.
 Example: RAID configurations for data storage.
2. Disaster Recovery Plans: Protocols to restore services after disasters, like server
crashes or natural calamities.
3. DDoS Mitigation: Tools like Cloudflare prevent Distributed Denial of Service
(DDoS) attacks from overwhelming systems.
 Real-World Example:
Cloud service providers like AWS and Azure implement redundancy to ensure 99.99%
uptime.

2. Threats

Threats are potential causes of harm to an organization's systems, data, or operations. They can
be categorized into various types:

a) Types of Threats

1. External Threats:
o Cybercriminals, hackers, or malware originating from outside the organization.
o Example:
 Phishing emails trick users into revealing credentials.
 Ransomware encrypts data, demanding payment for decryption.
2. Internal Threats:
o Actions by employees or insiders, either intentional or unintentional.
o Example:
 A disgruntled employee deleting critical files.
 Accidental sharing of sensitive information by an employee.
3. Advanced Persistent Threats (APTs):
o Long-term, targeted attacks by sophisticated actors (often state-sponsored).
o Example:
 Nation-state hackers stealing trade secrets from a corporation over months.

b) Threat Actors

1. Hackers:
o Motivated by personal, financial, or political gains.
 Black Hat Hackers: Engage in malicious activities.
 White Hat Hackers: Ethical hackers testing and improving security.
2. Script Kiddies:
o Amateur hackers using pre-written tools to exploit systems without deep
knowledge.

3. Vulnerabilities

A vulnerability is a weakness in a system, process, or technology that can be exploited by a


threat to compromise security.

a) Categories of Vulnerabilities

1. Software Vulnerabilities:
o Bugs or outdated software versions.
o Example:
 The EternalBlue exploit took advantage of unpatched Windows systems.
2. Hardware Vulnerabilities:
o Flaws in physical components.
o Example: Meltdown and Spectre exploited CPU design flaws to leak data.
3. Human Vulnerabilities:
o Social engineering exploits human psychology.
o Example:
 A phishing attack where an employee unknowingly downloads malware.

4. Attacks

Cyberattacks exploit vulnerabilities to compromise security.

a) Common Types of Attacks

1. Phishing:
o Fraudulent emails trick users into sharing sensitive data.
o Example: Fake PayPal login pages.
2. Malware:
o Malicious software like viruses, worms, or ransomware disrupts systems.
o Example: WannaCry ransomware attack.
3. SQL Injection:
o Attackers manipulate SQL queries to access databases.
o Example: Extracting customer records from an unprotected e-commerce platform.
4. Man-in-the-Middle (MitM):
o Attackers intercept communication between two parties.
o Example: Eavesdropping on unencrypted Wi-Fi connections.

5. Risk

Risk is the likelihood of a threat exploiting a vulnerability, resulting in a negative impact.

Risk Management Framework

1. Risk Identification:
o Catalog potential threats and vulnerabilities.
2. Risk Assessment:
o Evaluate the probability and impact of risks.
o Example: A bank assessing the risk of customer data breaches.
3. Risk Mitigation:
o Strategies include patching vulnerabilities, using firewalls, and employee training.

6. Countermeasures

Countermeasures aim to prevent, detect, or mitigate threats.

Key Countermeasures

1. Preventive: Firewalls, encryption, strong authentication.


2. Detective: Intrusion Detection Systems (IDS), security monitoring tools.
3. Corrective: Incident response plans, backups.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy