This work is licensed under a Creative Commons license
Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0)
You are free to:
Under the following terms:
Introduction To Cybersecurity
History & Foundations
Simone Aonzo, Ph.D.
History & Foundations – Topics
[1/4] History
1950-60s: Phreaking & ARPANET
1970s: Computer security is born
WarGames – 1983 film
1980s: Cybersecurity goes mainstream
1980s: The beginning of the malware era
The 1990s: The Internet age begins
The 2000s: Cyber security
The 2000s: A new level of connectivity and payments
The 2010s: Conflict in cyberspace
The 2020s: From cyber war to land war
Future? Educated guesses🔮
Suggested (Non-Technical) Books 📖
[2/4] Security Goals
Information Security (Cherdantseva and Hilton, 2013)
Security Goals
… Privacy 🤔
Security Goals – Confidentiality
The property of information remaining accessible only to authorized parties
Security Goals – Integrity
The property of data, software or hardware remaining unaltered
Security Goals – Availability
The property of information, services and computing resources remaining accessible for authorized use
Security Goals – Authorization
The property of computing resources being accessible only by authorized entities
Security Goals – Authentication
The act of proving/verifying the identity of a principal
Authenticity
The assurance that an exchange of information is from the source it claims to be
Security Goals – Accountability
The state of principals being answerable for past actions
Security Goals – Non-Repudiation
The property of proving (with legal validity) occurrence/non-occurrence of an event or participation/non-participation of one or more principals in an event
Privacy
The right of an individual to control the collection, use, and disclosure of their personal information
[3/4] Computer Security Policies and Attacks
Computer Security
Computer security protects assets
“This computer is secure”
A formal security policy precisely defines each possible system state as either
Policy and Countermeasures
A security policy allows a determination of when a security violation has occurred
Threat Agents and Attack Vectors
Secure against whom and from what types of attacks?
House security policy – A non technical example
Consider a simple security policy
Therefore:
[4/4] Vulnerability, Threat, Exploit, and Risk
Vulnerability, Threat, Exploit, and Risk
Vulnerability
Threat
Risk
Exploit
Vulnerability
Threat
An agent or actor that can cause harm
Advanced Persistent Threat (APT)
Crouching Yeti (Russia), Epic Turla (Russia), Darkhotel (Unknown)
Kaspersky
Fancy Bear (Russia), Deep Panda (China) and Charming Kitten (Iran)�CrowdStrike
Where Threats Can Come From
Exploit
Code or technique that takes advantage of a vulnerability to cause unintended or unanticipated behavior
For example
Classification
Exploit Types… and payouts 🤑
Source (Feb 2023) https://zerodium.com/program.html
Risk
The expected loss due to harmful future events, relative to an implied set of assets and over a fixed time period
Be careful: expert predictions FAIL
The world is too complicated to be predicted with accuracy (e.g., market predictions)
Risk Reduction
Risk is where a threat, vulnerability, and exploit overlap
Analyze threats, vulnerabilities, and risks
Quantitative Assessment
Attempt to estimate numbers and $$$ amounts
Qualitative Assessment
Qualitative assessment is scenario driven and does not attempt to assign $$$ values to components of the risk analysis
E.g., NIST 800-26 uses the CIA triad