Fundamentals of CS - Chapter 1
Fundamentals of CS - Chapter 1
Senait Desalegn
Name
Cybersecurity related
background
Assignment #1 Assignment #2
Quiz #1 – 5% Quiz #2 – 5%
– 5% – 5%
• adjective
• “involving, using, or relating to computers, especially the internet”
Logic layer
• where the platform nature of the Internet is defined and created
Information layer
• includes the creation and distribution of information and interaction
between users
Personal layer
• consists of people
Infrastructure Information
System
People Society
Driveittech.in
Big
Data
AI
AI
Individually
Implication of
Organizationally
cyberspace
Nationally
Security is the activities involved in protecting something against attack, danger, etc:
MNP Digital
• Cryptography. • IPS/IDS.
• Checksums (e.g. CRC). • Patch Management.
• Message Digests also known as a hash • Redundancy on hardware power (Multiple
(e.g. MD5, SHA1 or SHA2). power supplies/UPS’s/generators), Disks
• Digital Signatures: non-repudiation. (RAID), Traffic paths (Network design),
HVAC, staff.
• Access control.
• SLA’s – How much uptime do we
want(99.9%?)
overnments.
secret agents.
ployees.
competitors.
on insiders.
MNP Digital
• Attacker's Resources
Threats can be classified by • Attacker's Organization
multiple criteria: • Attacker's Funding
• Unstructured Threats
On basis of these criteria, • Structured Threats
threats are of 3 types: • Highly Structured threats
(IBM, 2022)
SiTE - AAiT - AAU 40
Chapter One
❖ Cyber and cyberspace
❖ Security, information security and cybersecurity
❖ Objectives/goals of cybersecurity
❖ Cybersecurity threats (challenges)
❖ Cybersecurity vulnerabilities
❖ Cybersecurity attacks
❖ Cybersecurity solutions (models and mechanisms)
❖ The importance of cybersecurity in software engineering
SiTE - AAiT - AAU 41
Vulnerabilities
vulnerabilities are weaknesses in the software, hardware, people that can
be exploited by attacker
Common causes
• Hardware.
• Software.
• Network.
• Personal.
• Physical site.
• Organizational.
Cyber spying
These are much harder to validate as, for obvious reasons, neither the
perpetrator or the victim wish to release information
Examples.
USA Vs China
Russia? Vs USA
North Korea Vs
South Korea, USA
Spear phishing
Whaling
•Technical
What are the main •Managerial
cybersecurity solutions •Human related
•Physical
Using a layered
Strong passwords, ACLs,
approach: Data encryption, EFS, backup
❖ Increases an
and restore strategy
Application Application hardening
attacker’s risk of OS hardening, authentication,
Host update management, antivirus updates,
detection auditing
❖ Reduces an attacker’s Internal network Network segments, IPSec, NIDS
• Secure citizens
• Secure organizations
• Secure nation