Loading...

COMPUTER SECURITY  

>

LEARNING OUTCOME 1

Computer Security

Computer security is the protection of computer systems and information from harm, theft, and unauthorized use.

IDENTIFY CRITICAL DATA ASSETS

Def: Critical data assets are those that are essential to the operation of an organization and could cause significant damage if compromised.

To identify critical data assets, organizations can consider the following factors:

Once critical data assets have been identified, organizations should take steps to protect them. This may include implementing security controls such as:

COMPUTER SECURITY

These assets can include:

In addition to implementing security controls, organizations should also train their employees on how to protect critical data assets. This training should cover topics such as data security best practices, how to identify and report phishing emails, and how to create strong passwords.

Here are some additional details about critical data assets that organizations should be aware of:

Organizations should take steps to protect their critical data assets from all potential threats. This includes threats from both internal and external actors. Organizations should also regularly review their security controls and procedures to ensure that they are effective in protecting their critical data assets.

Here are some examples of how critical data assets can be compromised:

Organizations should have a plan in place to respond to incidents involving critical data assets. This plan should include steps to contain the incident, investigate the incident, and recover from the incident.

By understanding and protecting their critical data assets, organizations can reduce their risk of data loss and other security incidents.

DISCUSS THE CIA (CONFIDENTIALITY, INTEGRITY AND AVAILABILITY) TRIAD

CIA Triad in Information Security

The CIA TRIAD

The CIA Triad Overview

The CIA triad, also known as the AIC triad, is a model designed to guide policies for information security within an organization. The CIA triad consists of three core principles:

1. CONFIDENTIALITY

In the CIA triad, it is the principle of ensuring that data is only accessible to authorized individuals. This means that unauthorized individuals should not be able to read, modify, or delete data without permission.

Confidentiality is important because it protects sensitive data, such as customer information, financial data, and trade secrets. If confidential data is compromised, it can lead to identity theft, financial losses, and other serious consequences.

There are a number of ways to protect confidentiality, including:

Organizations should also train their employees on how to protect confidentiality.

Here are some examples of how confidentiality can be compromised:

2. INTEGRITY

In the CIA triad, it is the principle of ensuring that data is accurate and complete. This means that data should not be modified or deleted without authorization, and that data should not be corrupted.

Integrity is important because it ensures that organizations can rely on their data to make informed decisions.

There are a number of ways to protect integrity, including:

Organizations should also train their employees on how to protect integrity.

Here are some examples of how integrity can be compromised:

3. AVAILABILITY

In the CIA triad, it is the principle of ensuring that data is accessible when needed. This means that systems and data should be up and running and accessible to authorized users when they need them.

Availability is important because it allows organizations to conduct their business and provide services to their customers.

There are a number of ways to protect availability, including:

Organizations should also train their employees on how to protect availability.

Here are some examples of how availability can be compromised:

Conclusion

The CIA triad is important because it provides a framework for organizations to assess and manage their information security risks. By understanding the CIA triad, organizations can develop and implement security controls to protect their critical data assets.

Here are some examples of security controls that can be used to protect critical data assets:

The CIA triad is a valuable tool for organizations of all sizes to protect their critical data assets.

Real-World Applications of the CIA Triad

Here are some examples of how the CIA triad is applied in the real world:

CONFIDENTIALITY

INTEGRITY

AVAILABILITY

Specific Scenario Application

SCENARIO: A customer is shopping online at a retail website. The customer enters their credit card information to complete the purchase.

THE PRINCIPLE OF LEAST PRIVILEGE

LEast Prividged

The principle of least privilege (POLP) is a security concept that states that a user or entity should only have the privileges necessary to perform their authorized tasks. This means that users should not have access to any more resources or data than they need to do their jobs.

POLP is important because it reduces the attack surface and the risk of data breaches. If a user's account is compromised, an attacker will only have access to the resources and data that that user has permission to access. This limits the damage that the attacker can do.

HOW IT WORKS

The principle of least privilege (POLP) works by limiting the permissions that users and entities have to access resources. This is done by identifying the minimum set of permissions that each user or entity needs to perform their authorized tasks, and then granting them only those permissions.

To implement POLP, organizations need to:

Here is an example of how POLP might work in a real-world environment:

Imagine that you are the IT manager for a company that has a database of customer data. You would need to implement POLP to protect the confidentiality, integrity, and availability of this data.

To do this, you would first need to identify all of the resources that need to be protected. In this case, the resources would include the database server, the database itself, and the application that is used to access the database.

Next, you would need to classify the resources according to their sensitivity. In this case, the customer database would be considered to be a highly sensitive resource.

Once you have classified the resources, you would need to identify the roles and responsibilities of all users and entities that need to access them. In this case, the users and entities would include employees who need to access the database to do their jobs, such as sales representatives and customer support representatives.

Finally, you would need to assign permissions to users and entities in a least-privilege manner. This would mean granting users and entities only the permissions they need to perform their authorized tasks. For example, a sales representative would need permission to view customer data, but they would not need permission to modify it.

BENEFITS OF THE PRINCIPLE OF LEAST PRIVILEGE

NON-BENEFITS OF THE PRINCIPLE OF LEAST PRIVILEGE

THE DEFENSE IN DEPTH MODEL

Defense in depth (DID) is a security strategy that involves implementing multiple layers of security controls to protect information and systems from attack. DID is based on the principle that no single security control is perfect, and that a combination of controls is more effective at preventing attacks and mitigating damage if an attack does succeed.

FUNDAMENTAL PRINCIPLES OF DEFENSE IN DEPTH

APPLICATIONS OF COMPUTER NETWORKS

IDENTIFY DATA SOURCES

A vulnerability scan is a process of identifying, analyzing, and reporting on security flaws and vulnerabilities in computer systems, networks, and applications.

Vulnerability scans should be performed on a regular basis, such as quarterly or annually.

Here are some tips for discussing vulnerability scan output with stakeholders:

SECURITY ANALYSIS TOOLS

SIEM (Security Information and Event Management) Dashboards

SIEM (Security Information and Event Management) dashboards are graphical user interfaces (GUIs) that provide real-time visibility into security data. They collect and analyze data from a variety of sources, such as network devices, security appliances, and applications. SIEM dashboards can be used to detect and investigate security threats, monitor compliance, and generate reports.

SIEM dashboards typically include a variety of features, such as:

SIEM dashboards are an essential tool for security analysts. They provide real-time visibility into security data and help security analysts to detect, investigate, and respond to security threats.

Benefits of Using SIEM Dashboards

Tips for Using SIEM Dashboards Effectively

Log Files

Log files are text files that record events and activities that occur in a computer system, application, or device. Log files can be used to troubleshoot problems, monitor system performance, and track user activity.

Log files are typically created by operating systems, applications, and devices. For example, a web server will create log files that record all of the requests that it receives.

Log files can be used for a variety of purposes, such as:

Bandwidth Monitors

A bandwidth monitor is a software tool that tracks and reports on network bandwidth usage. It can be used to monitor the bandwidth usage of individual devices, applications, or entire networks.

Bandwidth monitors can be used for a variety of purposes, such as:

Network Monitors

A network monitor is a software tool that monitors and analyzes the performance and availability of a computer network. It can be used to monitor network devices, applications, and services.

Network monitors can be used for a variety of purposes, such as:

Protocol Analyzer Output

Protocol analyzer output is the data that is captured and analyzed by a protocol analyzer. It is typically a text file that contains information about the packets that were captured.

Protocol analyzer output can be used for a variety of purposes, such as:

How These Data Sources Can Be Used for Security Analysis

These data sources can be used for security analysis in a variety of ways. For example:

ASSET INVENTORY

An asset inventory

An asset inventory is a list of all of the hardware and software assets that an organization owns. This inventory can be used to track the location, status, and configuration of these assets.

Importance of asset inventory

Asset inventory is important for a number of reasons, including:

USE OF NMAP (NETWORK MAPPER)

Nmap is a free and open-source network discovery and security auditing tool. It can be used to scan networks and identify all of the devices that are connected to the network. Nmap can also be used to identify the operating systems, services, and ports that are running on each device.

Nmap is a valuable tool for asset inventory because it can be used to identify all of the devices that are connected to a network, even if the devices are not configured to respond to network requests.

Nmap can also be used to identify the operating systems, services, and ports that are running on each device. This information can be used to create a comprehensive asset inventory that can be used to improve security, compliance, operational efficiency, and troubleshooting.

How to use Nmap for asset inventory

To use Nmap for asset inventory, you can use the following command:

nmap -sS <IP address range>

This command will scan the specified IP address range using the SYN stealth scan mode. The SYN stealth scan mode is a fast and efficient way to scan networks without alerting the devices that are being scanned.

Once the scan is complete, Nmap will output a list of all of the devices that were found on the network. This output will include information such as the device's IP address, MAC address, hostname, operating system, and open ports. You can then save this output to a file or import it into an asset inventory management tool.

IDENTIFY RISKS

TYPES OF RISKS

There are several types of risks in computer security, including:

RISK MANAGEMENT STRATEGIES

risk mitigation strategies

Risk management strategies are techniques that organizations use to identify, assess, and respond to risks.

There are four main risk management strategies:

ACCEPTANCE

Risk acceptance is a risk management strategy in which the organization decides to live with a risk and take no action to reduce it. This may be a good option if the risk is low or if the cost of mitigating the risk is too high.

For example, a company may accept the risk of a minor data breach if the cost of implementing security controls is too high. Or, a customer may accept the risk of a product not working as expected if the product is inexpensive and easy to replace.

Organizations should carefully consider the following factors before accepting a risk:

It is important to note that risk acceptance is not a static decision. Organizations should regularly review their risk assessments and make adjustments to their risk management strategies as needed.

Here are some additional tips for accepting risks:

AVOIDANCE

Risk avoidance is a risk management strategy in which the organization decides to eliminate a risk by not taking the action that creates the risk.

Risk avoidance can be implemented in a variety of ways, including:

Organizations should carefully consider the following factors before avoiding a risk:

Here are some additional tips for avoiding risks:

TRANSFERENCE

Risk transference is a risk management strategy in which the organization decides to transfer the risk to another party.

Here are some of the benefits of risk transference:

Organizations should carefully consider the following factors before transferring a risk:

Here are some additional tips for transferring risks:

MITIGATION

Risk mitigation is a risk management strategy in which the organization decides to reduce the likelihood or impact of a risk.

Risk mitigation can be implemented in a variety of ways, including:

Here are some additional tips for mitigating risks:

RISK REGISTER

A risk register is a document that lists all of an organization's identified risks, along with their likelihood, impact, mitigation strategies, and risk owners.

Here are some specific examples of how a risk register can be used to improve risk management:

CONTENTS OF A RISK REGISTER

The contents of a risk register can vary depending on the specific needs of the organization, but the following information is typically included:

Here are some tips for creating and maintaining an effective risk register:

End of Outcome Quiz

1 of 20

    Quiz Score

    Percentage: 0%

    Answered Questions: 0

    Correct Answers: 0

    Faults: