Cybersecurity is the new mindset!

chin4teck

Almost everything cyber And information security! Cybersecurity is the main line of defense for the next generations to come!

Who would be better to define this for us, but the legendary CISA! Since the definitions are so universal, i’m just going to leave the link here.

https://www.cisa.gov/news-events/news/what-cybersecurity

According to CISA, Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. It seems that everything relies on computers and the internet now—communication (e.g., email, smartphones, tablets), entertainment (e.g., interactive video games, social media, apps ), transportation (e.g., navigation systems), shopping (e.g., online shopping, credit cards), medicine (e.g., medical equipment, medical records), and the list goes on. How much of your daily life relies on technology? How much of your personal information is stored either on your own computer, smartphone, tablet or on someone else’s system?

Cybersecurity

There’s so much to learn, and so little time. Let’s start off with the foundations, like how do you protect data or information?

Security within an organization is a combination of frameworks, security controls, policies, and procedures. All of these components are put together to form a strong security posture. Understanding each section adds a significant increase in ones capability to integrate the knowledge in both a enterprise and a personal environment. Every aspect of Information security, network security, or even cybersecurity’s fall under one of the three major security controls.

Irrespective of the IT infrastructure’s size, you would want to protect it from various types of security threats. To do that, you need to apply different security measures and ensure that the organization’s assets are protected and safeguarded. These measures are known as security controls, which help you protect the infrastructure, be it physical or logical.

The security controls are implemented to handle risks in different ways. They can be implemented to protect the infrastructure by reducing or eliminating the risks. There is no fixed method of applying security controls in the infrastructure. The number and types of security controls will depend on various factors, including the architecture of the infrastructure, the size of the infrastructure, and the nature of the business.

It is important to note that no control works in isolation. Multiple control mechanisms need to be layered, which is known as defense-in-depth. Many security administrators make the mistake of adding too many security control mechanisms to protect the infrastructure. However, this adds to the complexity of the infrastructure. Therefore, an administrative policy should be implemented to prevent the over implementation of security measures. This policy needs to be measurable, effective, objective, and enforceable.

A security control must involve four key entities – people, processes, operations, and technology. The security controls must also be designed to protect the assets and, more specifically, the information for confidentiality, integrity, authenticity, and availability.

There are three different categories of security controls:

1. Administrative

2. Technical

3. Physical

Administrative

Administrative controls are implemented and applied to the individuals within an organization. The idea of administrative controls is to lay down a set of rules that must be adhered to. Some of the key examples are: • Training • Personnel recruitment • Change management • Access management • Employee screening • Certification programs • Non-disclosure agreements (NDA) • Disaster preparedness and recovery plans

Employee Screening
Certification Programs
Access Management
Change Management
Personnel Recruitment
Employee Training
Employee Screening
Certification Programs
Access Management
Change Management
Personnel Recruitment
Employee Training

Technical

Technical controls are also known as logical controls, which apply to the systems and devices. These controls can be in software or hardware forms that are used to protect the information assets. Some of the key examples are: • Encryption • Smart cards • Passwords • Firewalls • Routers • Network Authentication • Access Control Lists (ACLs) • Intrusion detection systems

Passwords
Encryption
Firewall
Network Authentication
Smart Cards
Routers and Network Devices
Access Control List
Passwords
Encryption
Firewall
Network Authentication
Smart Cards
Routers and Network Devices
Access Control List

Physical

Physical controls are designed to prevent unauthorized access to the data center’s physical location and the entire infrastructure. Some of the key examples are: • Barricades • Locked doors • Alarm systems • Security guards • Surveillance cameras • Dead-bolted steel doors

Security Guards
Alarm Systems
Locked Doors
Barricades
Dead Bolted doors/ Vault
Surveillance Cameras
Surveillance and Network Monitoring
Security Guards
Alarm Systems
Locked Doors
Barricades
Dead Bolted doors/ Vault
Surveillance Cameras
Surveillance and Network Monitoring

Each of the control categories can have various types of security controls, which are primarily:

Directive: Directs the users to a specific positive and acceptable behavior.

Preventive: Prevents undesirable events, which can be a risk or a threat, to occur.

Detective: Identifies a security risk, which can be present in a policy, process, or procedure.

Deterrent: Poses a warning that displays the consequences of unacceptable behavior.

Corrective: Defines measures that are designed to react to an incident. These controls are used to either reduce or eliminate a threat.

Recovery: Used to restore a system after an incident.

Compensating: Alternative controls that can be used in place of security controls that were difficult to implement. The compensating control works similarly to the original security control.

Administrative

• Directive: Policies, guidelines • Preventive: Non-Disclosure Agreement (NDA), separation of duties, warning banner • Detective: Investigation, log reviews • Deterrent: Demotion • Corrective: Penalty, administrative leave, termination • Recovery: Business Continuity Planning (BCP), Disaster Recovery Planning (DRP) • Compensating: Supervision, job rotation

Technical

• Directive: Standards • Preventive: User authentication, multi-factor authentication, firewalls, Intrusion Prevention System (IPS), encryption • Detective: Intrusion Detection System (IDS), SNMP • Deterrent: Violation report • Corrective: Update of access privileges, change in firewall policies • Recovery: Backups, rebuilding the system • Compensating: Keyboard logging

Physical

• Directive: Security guard • Preventive: Fences, bollards • Detective: CCTV, sensors • Deterrent: A warning sign • Corrective: Fire extinguishers • Recovery: Reconstruct, rebuild • Compensating: Layered defenses

SOC

Share this

Leave a Reply

Your email address will not be published. Required fields are marked *