🔒Cybersecurity and Cryptography Unit 2 – Information Security Fundamentals
Information security fundamentals form the backbone of protecting digital assets and data in our interconnected world. This unit covers key concepts like confidentiality, integrity, and availability, as well as common threats such as malware, phishing, and insider threats.
The study guide explores essential security controls, risk management strategies, and cryptography basics. It also delves into network security, legal considerations, and real-world case studies, providing a comprehensive overview of the field's core principles and practical applications.
Quantitative risk assessment assigns numerical values to likelihood and impact for more precise risk calculations
Risk treatment strategies include risk avoidance, reduction, transfer, and acceptance based on organizational risk appetite
Business impact analysis (BIA) assesses the consequences of disruptions on critical business processes and determines recovery priorities
Disaster recovery planning establishes procedures and resources to restore systems and data after a major incident (natural disasters, cyberattacks)
Incident response plans define roles, responsibilities, and steps to detect, contain, and recover from security incidents minimizing damage
Continuous monitoring tracks security posture, identifies changes, and detects anomalies for proactive risk management
Compliance with industry standards (ISO 27001, NIST) and regulations (GDPR, HIPAA) ensures adherence to best practices and legal requirements
Cryptography Basics
Cryptography is the practice of secure communication in the presence of adversaries using mathematical algorithms
Plaintext is the original, unencrypted message that is readable by anyone
Ciphertext is the encrypted version of the plaintext that appears as unintelligible data without the decryption key
Encryption algorithms transform plaintext into ciphertext using a secret key making it unreadable to unauthorized parties
Decryption algorithms reverse the encryption process to convert ciphertext back into plaintext using the corresponding key
Symmetric encryption uses the same key for both encryption and decryption requiring secure key exchange between parties (AES, DES)
Asymmetric encryption uses a public key for encryption and a private key for decryption enabling secure communication without prior key exchange (RSA, ECC)
Hash functions generate fixed-size digests (hash values) from input data providing data integrity and authentication (SHA-256, MD5)
Collision resistance ensures it is computationally infeasible to find two different inputs that produce the same hash value
Network Security
Network segmentation divides networks into smaller, isolated subnetworks (VLANs) to limit the scope of potential breaches
Virtual Private Networks (VPNs) establish encrypted tunnels over public networks for secure remote access and data transmission
Network Access Control (NAC) enforces security policies on devices before granting network access to prevent unauthorized connections
Wireless security protocols (WPA2, WPA3) encrypt wireless communication to protect against eavesdropping and unauthorized access
Security Information and Event Management (SIEM) systems collect and analyze log data from various sources to detect and respond to security incidents
Data Loss Prevention (DLP) solutions monitor and control the movement of sensitive data to prevent unauthorized exfiltration
Network traffic monitoring analyzes network flows to identify anomalies, detect malicious activities, and investigate incidents
Penetration testing simulates real-world attacks to identify vulnerabilities and assess the effectiveness of security controls
Legal and Ethical Considerations
Cybercrime laws (Computer Fraud and Abuse Act) define illegal activities in cyberspace and establish penalties for offenders
Data protection regulations (GDPR, CCPA) set requirements for collecting, processing, and securing personal data to protect individual privacy rights
Intellectual property laws (copyrights, patents) protect the rights of creators and owners of digital assets and software
Ethical hacking involves authorized penetration testing to identify vulnerabilities and improve security with permission from the target organization
Responsible disclosure policies encourage researchers to report vulnerabilities to vendors and allow time for patches before public disclosure
Privacy by design principles integrate privacy considerations into the development and implementation of systems and processes
Professional codes of conduct (ISC², ISACA) establish ethical standards and guidelines for cybersecurity professionals
Cybersecurity education and awareness initiatives promote responsible online behavior and help individuals protect themselves against threats
Practical Applications and Case Studies
Stuxnet was a sophisticated malware that targeted industrial control systems causing physical damage to Iranian nuclear facilities
WannaCry ransomware exploited a Windows vulnerability to encrypt files on infected systems demanding bitcoin payments for decryption
Equifax data breach exposed sensitive personal information of 147 million individuals due to unpatched vulnerabilities and inadequate security measures
NotPetya malware disguised as ransomware caused widespread disruption to businesses and infrastructure globally with estimated losses of $10 billion
Target data breach compromised 40 million credit and debit card numbers and personal information of 70 million customers through a third-party vendor
Mirai botnet hijacked IoT devices with default passwords to launch massive DDoS attacks disrupting major websites and services
SolarWinds supply chain attack infiltrated the software update process to distribute malware to thousands of organizations including government agencies
Capital One data breach exposed personal information of over 100 million credit card applicants due to a misconfigured firewall in their cloud infrastructure