0% found this document useful (0 votes)
0 views7 pages

cs_mid_exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 7

Topic 1

 Confidentiality : Keep info private.


 Integrity : Keep info accurate.
 Availability : Keep info accessible.
 Cybersecurity : Protects digital systems and info from online threats.
 Information Security : Broader term that includes all forms of info protection.

The evolution of cybersecurity:


The evolution of cyber security reflects the shift from simple information protection to addressing
complex digital threats in an interconnected world, focusing on confidentiality, integrity, and
availability.

Cybersecurity Situational Awareness


Cybersecurity situational awareness involves understanding the unique business and technology
environment of an organization to effectively identify, assess, and respond to evolving threats
like APTs, while considering factors such as business risk tolerance, IT complexity, industry
trends, and emerging technologies. This awareness is critical for protecting systems and
information in today’s dynamic cyberlandscape.

cybersecurity skills gap:


Cybersecurity requires skilled professionals with expertise in technology, business, and
communication to tackle evolving threats. The field demands knowledge of emerging threats,
advanced regulations, and risk management. Cybersecurity protects organizations from both
internal and external threats by focusing on data security, signal processing, risk analytics, and
system security engineering to safeguard critical digital assets.
Topic 2
Difference Between Cybersecurity and Information Security
 Information Security (InfoSec) : Focuses on protecting all forms of information ,
regardless of format—whether it’s paper documents, digital files, intellectual property, or
verbal communications. Its primary goals are to ensure confidentiality, integrity, and
availability (the CIA triad) of information in any medium.
 Cybersecurity : A subset of information security that specifically deals with protecting
digital assets —such as networks, hardware, and data processed, stored, or transported
by interconnected systems. It addresses threats like hacking, malware, nation-state
attacks, and advanced persistent threats (APTs).
six key functions to protect digital assets:
Govern (GV) – Establish and oversee cybersecurity policies, risk management, and compliance to
align with business objectives.
Identify – Assess risks to systems, data, and infrastructure.
Protect – Implement safeguards to minimize potential damage.
Detect – Monitor for cybersecurity threats and incidents.
Respond – Take action to mitigate the impact of breaches.
Recover – Restore systems and ensure resilience.
Topic 3

Confidentiality, Integrity, and Availability (CIA Triad)


1. Confidentiality
 Protects information from unauthorized access or disclosure.
 Sensitivity of data determines the level of protection (e.g., medical records require
higher confidentiality than meeting minutes).
 Tools: Access controls, file permissions, encryption.
2. Integrity
 Ensures information is protected from unauthorized modification (e.g., preventing a
bank transfer amount from being altered).
 Violations can lead to broader attacks on confidentiality or availability.
 Tools: Logging, digital signatures, hashes, encryption, access controls.
3. Availability
 Ensures timely and reliable access to information and systems, especially for
mission-critical operations.
 Loss of availability can disrupt productivity, revenue, and decision-making.
 Tools: Redundancy, backups, access controls.

Nonrepudiation:
Nonrepudiation ensures that a party cannot deny the authenticity of a message or transaction
they sent or received. It relies on confidentiality , integrity , and availability to guarantee
that data is genuine, unaltered, and accessible. Nonrepudiation is critical in trust-based scenarios
like financial or legal transactions and is implemented using tools like transactional logs and
digital signatures .

Topic 4: Cybersecurity Roles


Cybersecurity is a shared responsibility across all levels of an organization, with specific roles
and governance structures ensuring effective management of risks. The key roles include:
1. Governance, Risk Management, and Compliance (GRC):
 Governance: The board of directors and senior management set strategic
direction, ensure objectives are met, and verify that resources are used responsibly.
 Risk Management: Identifies, assesses, and mitigates risks to acceptable levels
using internal controls.
 Compliance: Ensures adherence to legal, regulatory, and contractual
requirements.
2. Cybersecurity Roles in Practice:
 Board of Directors: Provides oversight and ensures alignment with organizational
goals.
 Executive Committee: Implements strategies and allocates resources for
cybersecurity.
 Security Management: Develops policies, procedures, and frameworks to
manage risks.
 Cybersecurity Practitioners: Execute day-to-day tasks like monitoring, incident
response, and vulnerability management.
3. Key Responsibilities of Cybersecurity Professionals:
 Analyze policies, trends, and intelligence to understand adversaries' behavior.
 Solve problems and detect threats using technical IT skills and advanced analytical
capabilities.
 Act as practitioners or part of senior management to guide cybersecurity strategies.

Topic 5: Cybersecurity Domains


1. Cybersecurity Concepts:
 Basic risk management principles.
 Common attack vectors, threat agents, and patterns.
 Types of security policies, procedures, and control processes.
2. Security Architecture Principles:
 Security frameworks, system topology, and perimeter concepts.
 Firewalls, encryption, isolation, segmentation, and monitoring techniques.
 Defense-in-depth strategies to layer controls and mitigate risks.
Note:: check the domain list. And learn 5 to 10 domains , and see some cyber security roles and
responsibilities organograms.
Here are 50 domains of cybersecurity:
1. 🔒 Network Security
2. 🔒 Application Security
3. ☁ Cloud Security
4. 🔒 Mobile Security
5. 🔒 Cryptography
6. 🔒 Data Loss Prevention (DLP)
7. 🔒 Identity and Access Management (IAM)
8. 🔒 Endpoint Security
9. 🔒 Incident Response
10. 🔒 Threat Intelligence
11. 🔒 Security Operations Center (SOC)
12. 🔒 Security Information and Event Management (SIEM)
13. 🔒 Penetration Testing
14. 🔒 Vulnerability Management
15. 🔒 Security Awareness Training
16. 🔒 Forensics Analysis
17. 🔒 Secure Coding
18. 🔒 Web Security
19. 🔒 Wireless Security
20. 🔒 Physical Security
21. ⚖ Risk Management
22. 🔒 Compliance Management
23. 🔒 Governance, Risk, and Compliance (GRC)
24. 🔒 Security Architecture
25. 🔒 Security Policy and Procedures
26. 🔒 Disaster Recovery
27. 🔒 Business Continuity Planning
28. 🔒 Secure Development Lifecycle (SDL)
29. 🔒 Intrusion Detection and Prevention Systems (IDPS)
30. 🔒 Virtual Private Networks (VPNs)
31. 🔒 Secure Socket Layer/Transport Layer Security (SSL/TLS)
32. 🔒 Multi-factor Authentication (MFA)
33. 🔒 Zero Trust Security Model
34. 🔒 Insider Threat Management
35. 🔒 Supply Chain Security
36. ⚙ Industrial Control Systems (ICS) Security
37. 🔒 Internet of Things (IoT) Security
38. 🔒 Data Privacy
39. 🔒 Digital Forensics
40. 🔒 Malware Analysis
41. 🔒 Social Engineering
42. 🔒 Threat Hunting
43. 🔒 Blockchain Security
44. 🌑 Dark Web Monitoring
45. 🔒 Security Training and Certification
46. 🔒 Security Metrics and Reporting
47. 🔒 Password Management
48. 🔒 Red Team/Blue Team Exercises
49. ⚙ Security Automation
50. ⚛ Quantum Cryptography

You might also like