Cyb 211-Lecture 1-Cyber Overview
Cyb 211-Lecture 1-Cyber Overview
FACULTY OF COMPUTING
DEPARTMENT OF CYBER SECURITY
The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad
is a common model that forms the basis for the development of security systems, outlining how
to safeguard data and information systems from various threats and vulnerabilities.
First, the information must have protections capable of preventing some users from accessing it.
Second, limitations must be in place to restrict access to the information to only those who have
the authorization to view it.
Third, an authentication system must be in place to verify the identity of those with access to the
data.
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
• Use of confidentiality policies in organization
• Employee awareness
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |1
Risks: Breaches in confidentiality can result from unauthorized access, data interception, social
engineering attacks, or insider threats.
Example: Protecting patient records in healthcare, where only authorized doctors or medical
staff can access patient information.
2. INTEGRITY: refers to the assurance that data has not been tampered with and can thus be
trusted. Data integrity covers data in storage, during processing, and while in transit.
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
Risks: Integrity can be compromised through attacks like man-in-the-middle (MITM), malware
infections, or data tampering.
Example: Financial transactions in a banking system where data integrity is critical to prevent
unauthorized alterations to transaction records.
3. AVAILABILITY; this ensures that data can be accessed when needed and will continue to
function when required.
Risks: Availability can be disrupted by attacks like Distributed Denial of Service (DDoS),
hardware failures, or natural disasters.
Example: An e-commerce platform like JUMIA that must remain operational 24/7 to handle
customer transactions without downtime.
AAA is a standard-based security framework used to control who is permitted to use network
resources (through authentication), what they are authorized to do (through authorization), and
track user activities while accessing the network (through accounting). It is widely applied in
network and system security to manage and safeguard access to data and resources effectively.
AAA is an essential concept in network security that is often implemented as part of broader
frameworks or security architectures. It provides a foundation for access control and
accountability within a network environment.
AAA uses a client/server model. The client runs on the access device, or the network access server
(NAS), which authenticates user identities and controls user access. The server maintains user
information centrally.
AUTHENTICATION
Authentication is the process of verifying the identity of a user or entity attempting to access a
network resource. The goal is to ensure that the user is who they claim to be. Various
authentication methods can be employed, including:
• Username and password: This is the most common form of authentication, where users
provide a unique username and a corresponding password.
• Two-factor authentication (2FA) or multi-factor authentication (MFA): In addition to a
username and password, this method requires an additional factor, such as a security token, SMS
verification code, biometric data, or smart cards.
• Digital certificates: Certificates are issued by a trusted authority and serve as a digital
identity for users or devices. They are used to authenticate entities in a secure manner.
• Biometric authentication: Biometric characteristics like fingerprints, iris scans, or facial
recognition can be used to authenticate individuals.
AUTHORIZATION
Authorization is the process of assigning differentiated rights to authorize users to use specific
services to access Commands, Resources and Information.
• Roles: Users are assigned specific roles within the network, and their access rights are defined
based on those roles. For example, an administrator may have full access to all resources, while
a regular user may have limited access.
• Groups: Users are grouped based on common attributes or permissions. Access rights can be
assigned to groups, simplifying the management of user permissions.
• Permissions: Specific access permissions can be assigned directly to individual users or entities,
granting or denying access to specific resources or actions.
ACCOUNTING
Accounting is the process of tracking and recording user activities and resource usage on a
network. It involves collecting data related to user access, network interactions, and resource
consumption for auditing, security analysis, and billing purposes. The primary goal of accounting
is to provide a detailed record of what actions users or entities perform within the network.
• Resources accessed
• Actions performed
• Duration of sessions
• Data transferred
The accounting information collected can be used for generating reports, detecting anomalies,
identifying potential security breaches, or conducting forensic investigations.
NON REPUDIATION
Non-repudiation is a regulatory notion commonly used in cybersecurity and refers to the service
that confirms the origin and integrity of data. It assures that no party can deny sending or receiving
a communication using encryption and digital signatures. Non-repudiation provides evidence of
data's origin, authenticity, and integrity. It verifies the sender that the information is sent and the
recipient's identity to the receiver. Neither side can dispute that communication happened or was
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |4
processed in this manner. For instance In online banking, when users authenticate transactions
using 2FA (like a one-time password or biometric), it provides evidence that they approved the
transaction. The bank can use this to prove the user's participation in the transaction if there's any
dispute.
ASSIGNMENT 1
Imagine you are designing the information system for Federal Medical Center Asaba. Describe
specific measures you would implement to ensure the confidentiality, integrity, and availability
of patient records, and explain why each measure is essential for maintaining a secure and reliable
healthcare environment.