0% found this document useful (0 votes)
142 views5 pages

Cyb 211-Lecture 1-Cyber Overview

The document outlines fundamental concepts of cybersecurity, focusing on the CIA triad: Confidentiality, Integrity, and Availability, which are essential for protecting data and information systems. It also discusses the AAA framework (Authentication, Authorization, Accounting) for managing access to network resources and emphasizes the importance of non-repudiation in ensuring data integrity and origin verification. Additionally, it includes an assignment on designing an information system for a healthcare facility to maintain patient record security.

Uploaded by

loganatemo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views5 pages

Cyb 211-Lecture 1-Cyber Overview

The document outlines fundamental concepts of cybersecurity, focusing on the CIA triad: Confidentiality, Integrity, and Availability, which are essential for protecting data and information systems. It also discusses the AAA framework (Authentication, Authorization, Accounting) for managing access to network resources and emphasizes the importance of non-repudiation in ensuring data integrity and origin verification. Additionally, it includes an assignment on designing an information system for a healthcare facility to maintain patient record security.

Uploaded by

loganatemo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DENNIS OSADEBAY UNIVERSITY

FACULTY OF COMPUTING
DEPARTMENT OF CYBER SECURITY

COURSE TITLE: INTRODUCTION TO CYBERSECURITY AND STRATEGY (2 Units C: LH 30)


COURSE CODE: CYB 211

TOPIC: OVERVIEW OF BASIC CONCEPTS OF CYBER SECURITY

BASIC CONCEPTS IN CYBER SECURITY

The CIA TRIAD

The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad
is a common model that forms the basis for the development of security systems, outlining how
to safeguard data and information systems from various threats and vulnerabilities.

CONFIDENTIALITY: this refers to security controls required to prevent the disclosure of


information to unauthorized individuals, applications or systems. Confidentiality ensures data is
available only to the authorized. Assuring that unauthorized parties do not have access to a piece
of information is a complex task. It is easiest to understand when broken down into three major
steps:

First, the information must have protections capable of preventing some users from accessing it.

Second, limitations must be in place to restrict access to the information to only those who have
the authorization to view it.

Third, an authentication system must be in place to verify the identity of those with access to the
data.

Standard measures to establish confidentiality include:

• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
• Use of confidentiality policies in organization
• Employee awareness
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |1
Risks: Breaches in confidentiality can result from unauthorized access, data interception, social
engineering attacks, or insider threats.

Example: Protecting patient records in healthcare, where only authorized doctors or medical
staff can access patient information.

2. INTEGRITY: refers to the assurance that data has not been tampered with and can thus be
trusted. Data integrity covers data in storage, during processing, and while in transit.

Standard measures to guarantee integrity include:

• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups

Risks: Integrity can be compromised through attacks like man-in-the-middle (MITM), malware
infections, or data tampering.

Example: Financial transactions in a banking system where data integrity is critical to prevent
unauthorized alterations to transaction records.

3. AVAILABILITY; this ensures that data can be accessed when needed and will continue to
function when required.

Standard measures to guarantee availability include:

• Backing up data to external drives


• Implementing firewalls
• Having backup power supplies
• Data redundancy

Risks: Availability can be disrupted by attacks like Distributed Denial of Service (DDoS),
hardware failures, or natural disasters.

Example: An e-commerce platform like JUMIA that must remain operational 24/7 to handle
customer transactions without downtime.

INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |2


AUTHENTICATION, AUTHORIZATION, ACCOUNTING

AAA is a standard-based security framework used to control who is permitted to use network
resources (through authentication), what they are authorized to do (through authorization), and
track user activities while accessing the network (through accounting). It is widely applied in
network and system security to manage and safeguard access to data and resources effectively.

In network security, AAA stands for Authentication, Authorization, and Accounting. It is a


framework or set of processes that are implemented to ensure secure access to network resources.

AAA (Authentication, Authorization, and Accounting) is not a comprehensive network security


framework but rather a set of processes or components within network security.

AAA is an essential concept in network security that is often implemented as part of broader
frameworks or security architectures. It provides a foundation for access control and
accountability within a network environment.

AAA uses a client/server model. The client runs on the access device, or the network access server
(NAS), which authenticates user identities and controls user access. The server maintains user
information centrally.

AUTHENTICATION

Authentication is the process of verifying the identity of a user or entity attempting to access a
network resource. The goal is to ensure that the user is who they claim to be. Various
authentication methods can be employed, including:

• Username and password: This is the most common form of authentication, where users
provide a unique username and a corresponding password.
• Two-factor authentication (2FA) or multi-factor authentication (MFA): In addition to a
username and password, this method requires an additional factor, such as a security token, SMS
verification code, biometric data, or smart cards.
• Digital certificates: Certificates are issued by a trusted authority and serve as a digital
identity for users or devices. They are used to authenticate entities in a secure manner.
• Biometric authentication: Biometric characteristics like fingerprints, iris scans, or facial
recognition can be used to authenticate individuals.

AUTHORIZATION

Authorization is the process of assigning differentiated rights to authorize users to use specific
services to access Commands, Resources and Information.

INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |3


Authorization follows the least privilege principle. That is, users are granted only the permissions
required for executing required functions to prevent any accidental or malicious network
behavior.

Authorization can be granted based on factors such as:

• Roles: Users are assigned specific roles within the network, and their access rights are defined
based on those roles. For example, an administrator may have full access to all resources, while
a regular user may have limited access.
• Groups: Users are grouped based on common attributes or permissions. Access rights can be
assigned to groups, simplifying the management of user permissions.
• Permissions: Specific access permissions can be assigned directly to individual users or entities,
granting or denying access to specific resources or actions.

ACCOUNTING

Accounting is the process of tracking and recording user activities and resource usage on a
network. It involves collecting data related to user access, network interactions, and resource
consumption for auditing, security analysis, and billing purposes. The primary goal of accounting
is to provide a detailed record of what actions users or entities perform within the network.

Accounting information provides a trail of actions and events, aiding in accountability,


troubleshooting, compliance, and security analysis. Accounting records may include details such
as:

• User logins and logouts

• Resources accessed

• Actions performed

• Duration of sessions

• Data transferred

• Errors or security-related events

The accounting information collected can be used for generating reports, detecting anomalies,
identifying potential security breaches, or conducting forensic investigations.

NON REPUDIATION

Non-repudiation is a regulatory notion commonly used in cybersecurity and refers to the service
that confirms the origin and integrity of data. It assures that no party can deny sending or receiving
a communication using encryption and digital signatures. Non-repudiation provides evidence of
data's origin, authenticity, and integrity. It verifies the sender that the information is sent and the
recipient's identity to the receiver. Neither side can dispute that communication happened or was
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |4
processed in this manner. For instance In online banking, when users authenticate transactions
using 2FA (like a one-time password or biometric), it provides evidence that they approved the
transaction. The bank can use this to prove the user's participation in the transaction if there's any
dispute.

ASSIGNMENT 1

Imagine you are designing the information system for Federal Medical Center Asaba. Describe
specific measures you would implement to ensure the confidentiality, integrity, and availability
of patient records, and explain why each measure is essential for maintaining a secure and reliable
healthcare environment.

INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |5

You might also like