0% found this document useful (0 votes)
7 views

CS_Lecture02

The document discusses core principles of cybersecurity, including the CIA Triad (Confidentiality, Integrity, Availability) and the concept of Defense in Depth, which emphasizes multiple layers of security. It covers key topics such as risk assessment, incident response, disaster recovery, regulatory compliance, and the importance of security policies. Additionally, it highlights common security challenges faced in the field, such as cyberattacks and insider threats.

Uploaded by

Rabeel Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

CS_Lecture02

The document discusses core principles of cybersecurity, including the CIA Triad (Confidentiality, Integrity, Availability) and the concept of Defense in Depth, which emphasizes multiple layers of security. It covers key topics such as risk assessment, incident response, disaster recovery, regulatory compliance, and the importance of security policies. Additionally, it highlights common security challenges faced in the field, such as cyberattacks and insider threats.

Uploaded by

Rabeel Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Cyber Security(CS)

by
Dr. Munir Ahmad
Lecture 2: Understanding Security
Principles

• Introduction to Core Security Principles


and Concepts
What is Security?

• Security refers to the protection of


information, assets, and resources from
unauthorized access, use, disclosure,
disruption, modification, or destruction. It
involves the implementation of measures
to prevent, detect, and respond to
security incidents and breaches.
The CIA Triad

• The CIA Triad is a foundational concept in


information security, representing three
core principles that underpin the security
of data and information systems.
• Confidentiality
• Integrity
• Availability
Defense in Depth

• Multiple Layers: Defense-in-Depth involves using a


combination of security measures and strategies across
various layers of a network or system.

• Redundancy: This approach includes redundancy in


security measures so that if one layer fails or is breached,
there are others in place to mitigate the threat.

• Diverse Technologies: Implementing a variety of


technologies, including firewalls, intrusion detection
systems, access controls, encryption, and more, at
different layers of the network or system.
Risk, Vulnerability, and Threat

• Risk: The probability of a specific threat


exploiting a vulnerability, potentially leading to
harm, damage, or loss to an organization's assets.
• Vulnerability: A weakness or flaw in a system,
process, or technology that can be exploited by a
threat to compromise the integrity,
confidentiality, or availability of assets.
• Threat: Any potential danger or harm to an
organization's assets, including data, systems, or
infrastructure, which can be human,
environmental, or technological in nature.
Security Controls

Security controls are the measures taken


to safeguard information and systems.
These can include technical controls such
as firewalls and encryption, as well as
administrative controls such as policies
and procedures.
Risk Assessment

Identifying and evaluating potential


security risks is crucial to protecting your
organization's assets and information.
Incident Response

Incident response is a process in which an


organization responds to and manages a
security incident, such as a data breach or
cyber attack. The goal of incident response
is to minimize damage and restore normal
operations as quickly as possible.
Disaster Recovery and Business
Continuity

Disaster Recovery:
• The process of restoring systems and
data after an unexpected event or
disaster.
Business Continuity:
• The ability to continue operations during
and after a disaster or unexpected event.
Regulatory Compliance

Regulatory compliance refers to the


processes and procedures that
organizations must follow in order to meet
legal and regulatory requirements related
to security and privacy. These
requirements can come from a variety of
sources, including government agencies,
industry standards bodies, and contractual
obligations.
Security Policies and Guidelines

Security policies and guidelines are


essential for ensuring the confidentiality,
integrity, and availability of information.
They provide a framework for managing
security risks and help organizations
comply with legal and regulatory
requirements. Policies and guidelines
should be based on industry best practices
and tailored to the specific needs of the
organization.
Common Security Challenges

Some of Common security challenges in the


field of cybersecurity and information
security include:

• Cyberattacks
• Data Breaches
• Insider Threats
• Weak Passwords
• Social Engineering
Thanks

• Email: [email protected]
• Mobile: 03007300232

You might also like