Download presentation
Presentation is loading. Please wait.
1
Cybersecurity: Threat Matrix
Janica Edmonds
2
Cybersecurity First Principles
Domain separation Process Isolation Resource encapsulation Layering Modularization Least Privilege Information hiding Abstraction Simplicity Minimization Domain Separation: Separating areas where resources are located prevents accidents and loss of data, keeping information worlds from colliding. Process Isolation: A process occurs when a task is executed. Keeping processes separate prevents the failure of one process from negatively impacting another. Resource Encapsulation: Resources – hardware, system objects, or processes – must be separated and used as intended. Layering: Multiple layers of defense protect information. If one layer is defeated, the next one should catch it. Modularization: Able to be inserted or removed from a project; each module has its own function, interchangeable with other modules. Least Privilege: Limits what access people have to your resources and what they can do with them. Information Hiding: Any attempt to prevent people from being able to see information. Abstraction: Abstraction is a fancy word for summarizing or explaining in a way that can be easily understood. Simplicity: If something is less complicated, it is less likely to have problems and it is easier to troubleshoot and fix. Minimization: Minimization’s goal is to simplify and decrease the number of ways the software can be exploited.
3
Cyber Realm Card game Created by GenCyber Duo at California State University, San Bernardino Played in pairs Find a partner who is sitting in a row other than the one you are sitting in.
4
Security Needs Confidentiality Integrity Availability
Basic security needs are confidentiality, integrity, and availability of all components within a system or network. Confidentiality is preserving sensitive data or resources from unauthorized disclosure. Integrity is preventing the modification of data or resources by unauthorized users, preventing unauthorized or unintentional modification by authorized users, and preserving the consistency of the data and resources. Availability is the timely and uninterrupted access to data and resources.
5
Security Threats A potential occurrence, malicious or otherwise, that might damage or compromise assets. Interception – asset is diverted. Interruption – asset is delayed Modification – asset is altered. Fabrication – asset is manufactured.
6
Security Assets Components of the system or network. Hardware Software
People Data
7
Example: Mom & Pop Shop Mom & Pop Shop Security
Running a touristy type business selling handmade crafts Keep accounts and business transactions records on a computer Running a website to advertise their business Security What are the assets? How does CIA apply? What are ways that CIA could be threatened?
8
Threat Matrix Threat/Asset HW SW People Data Interception Interruption
Modification Fabrication What are some things that could happen to threaten the security of the system? -could be intentional or unintentional -could be malicious or an accident -could be natural disaster or man-made disaster
9
Example: Threat Matrix
Mom & Pop Shop Threat/Asset HW SW People Data Interception Interruption Modification Fabrication What are some things that could happen to threaten the security of the Mom & Pop Shop? Form small groups of three or four Brainstorm ways of filling in the possible threats to the security of the Mom & Pop Shop 10 minutes or so Reconvene for discussion
10
Example: Principles Applied
Domain separation Layering Least privilege Information hiding Simplicity Minimization Modularization Domain separation – keep website hosting separate from accounting records Layering – levels of security Least privilege – who has access? To what? Information hiding – keeping account #s, etc. hidden. Simplicity – Minimization – least functionality needed no online purchases? No need for certain SW Modularization – let’s add functionality online purchases! How does that change the threat matrix?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.