Certified in Cyber Security (CC) Part 1: Key Principles
This article is part 1 (of 6) of a series to help you prepare for the ISC2 Certified in Cybersecurity (CC) certification. The CC certification is a foundational certification that covers the core concepts and principles of cybersecurity. It is designed for anyone who wants to enter or progress in the cybersecurity field, regardless of their background or experience.?Find out more at: https://www.dhirubhai.net/pulse/cyber-awareness-month-2023-your-journey-isc2-cc-jean-baptiste-bres
Information Security refers to the practice of protecting information from unauthorised access, use, disclosure, disruption, modification, or destruction. It is an essential aspect of any organisation that deals with sensitive data, such as personal information, financial data, or intellectual property.
In this article, we will cover the key principles of information security in a way that is accessible to individuals without a technical background. More specifically, we will be covering 5 key principles:
By the end of this article, you will have a solid understanding of information security principles and the necessary steps to protect your organisation's information from cyber threats.
Confidentiality, Integrity and Availability: The CIA Triad
Protecting sensitive information is crucial for any organisation. Whether it is personal information, financial data, or intellectual property, it is essential to ensure that data is kept secure and protected from cyber threats. The concept of information security? is all about safeguarding data by ensuring its confidentiality, integrity, and availability, also known as the CIA triad.
The CIA triad is the foundation of information security , and it comprises the three essential elements (confidentiality, integrity, and availability) that work together to protect data. These elements provide the framework for organisations to ensure the protection of their sensitive data.
?You can see the CIA triad as a framework for information security . Confidentiality ensures that data is protected from unauthorised access, integrity ensures that data is not altered in an unauthorised manner, and availability ensures that data is accessible to authorised users when and where it is needed. By ensuring the CIA triad, organisations can protect their sensitive data from cyber threats and ensure that their data remains secure and reliable.
Non-repudiation
Another key element in Information Security is the concept of non-repudiation. Non-repudiation is the ability to prove that a message or action was actually sent or performed by the party claiming to have sent or performed it, and that the party cannot deny having done so later on. Non-repudiation is important in information security because it helps ensure accountability and prevent disputes or legal issues related to denial of responsibility.
In order to achieve non-repudiation, there are typically three key requirements:
One common example of non-repudiation is digital signatures. A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. It ensures that the message was sent by the person who claims to have sent it and that the message has not been tampered with in transit. Digital signatures are commonly used in e-commerce transactions and other situations where the authenticity of the message is critical.
Another example of non-repudiation is in email communication. When sending an email, a digital signature can be added to the message to ensure that the recipient can verify that the message came from the sender and that the message has not been altered in transit. Additionally, email servers may keep logs of all incoming and outgoing messages, providing an audit trail that can be used to verify the authenticity of the message and the identity of the sender.
Overall, non-repudiation is an important aspect of information security, providing a way to ensure accountability and prevent disputes or legal issues related to denial of responsibility. By implementing measures such as digital signatures and auditing, organisations can increase their level of non-repudiation and ensure that their communication and transactions are secure and reliable.
Privacy
Privacy refers to an individual's right to control their personal information and how it is collected, used, shared, and stored. In the context of information security, privacy is an important consideration because organisations collect and store vast amounts of personal information about their customers, employees, and partners. This information can include names, addresses, social security numbers, credit card numbers, and other sensitive data.
Privacy is protected by laws and regulations that govern how personal information is collected, used, and shared. For example, the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) are two important laws that protect the privacy of individuals. These laws require organisations to obtain explicit consent from individuals before collecting their personal information, and they provide individuals with the right to access, correct, and delete their personal information. In Australia, privacy is protected by the Privacy Act 1988.
To protect privacy, organisations must implement appropriate security controls to prevent unauthorised access to personal information. This might include measures such as encryption, access controls, and data backup and recovery. Organisations must also have policies and procedures in place to ensure that personal information is collected, used, and shared in accordance with applicable laws and regulations.
Privacy is becoming increasingly important as more organisations collect and store vast amounts of personal information. A privacy breach can have serious consequences for both individuals and organisations. For example, a company that experiences a data breach can face financial penalties, loss of customer trust, and damage to its reputation. Individuals whose personal information is compromised can be at risk of identity theft, financial fraud, and other forms of harm.
Privacy is an important aspect of information security that requires organisations to protect personal information and ensure that it is collected, used, and shared in accordance with applicable laws and regulations. By implementing appropriate security controls and policies and procedures, organisations can protect the privacy of individuals and maintain their trust and confidence.
?
Risk Management
In today's interconnected world, information is a valuable asset that organisations must protect from various risks and threats. These risks and threats can come in many forms, such as cyber-attacks, natural disasters, human error, and other unforeseen events. Therefore, organisations must adopt a systematic approach to assess and manage these risks to protect their valuable assets and ensure business continuity.
Risk management is the process of identifying, assessing, and prioritising and implementing strategies to mitigate or transfer them. It is a continuous process that involves ongoing monitoring and reassessment of risks and the effectiveness of risk management strategies.
The risk management process is usually comprised of 3 steps:
Risk Identification
To manage risk, the first step is to identify potential threats and vulnerabilities. In the context of cybersecurity, threat actors are individuals or groups who seek to exploit vulnerabilities in an organisation's information system for personal gain or malicious intent. Threat actors can come from a variety of sources:
Vulnerabilities are weaknesses in a system that a treat might exploit to undermine the confidentiality, integrity or availability of the organisation. Vulnerabilities might include missing patches or misconfiguration.
Risks occur when an environment contains both a vulnerability and a corresponding threat that might exploit that vulnerability. For example, if a company forget to update their antivirus signatures on their workstations and hackers release a new virus upon the internet, the organisation faces a risk. It is vulnerable because it is missing a security control, and there is a threat: the new virus.
?
Risk Assessment
Once risks have been identified, the next step is to assess them. This involves estimating and prioritising risks to an organisation’s operations (including its mission, functions, image, and reputation), assets, individuals, and other organisations (even the nation). The risk assessment process should result in aligning (or associating) each identified risk resulting from the operation of an information system with the goals, objectives, assets, or processes of the organisation.
One common method for prioritising risks is the likelihood (or probability) and impact model. This model involves assessing the likelihood of a risk occurring and the potential impact if it does occur. For example, a hospital might identify the risk of a cyberattack on its patient data. The hospital might estimate that the likelihood of a successful attack is high, and that the impact would be severe. Based on this assessment, the hospital might prioritise this risk as a high priority and take steps to mitigate it.
A tool used for such assessment is a risk prioritisation matrix. It helps organisations determine which risks to prioritise for action based on their likelihood and potential impact. The matrix typically divides risks into three categories: high priority, medium priority, and low priority. For example, a bank might use a risk prioritisation matrix to determine that a phishing attack on its customers is a high priority risk, while a minor software vulnerability is a low priority risk.
领英推荐
Risk Treatment
After risks have been identified, assessed, and prioritised, organisations can decide on appropriate risk response strategies. These strategies might include:
Managing information security risks requires a systematic approach that includes identifying and assessing risks, prioritising risks based on their probability and impact, and selecting appropriate risk response strategies. By following these steps, organisations can reduce the likelihood and impact of security incidents and protect their valuable assets, reputation, and customers.
The Risk Management Process enables organisations to assess and prioritise risks and decide on appropriate risk response strategies. Organisations should have a systematic approach to identifying risks, assessing their potential impact, and deciding on appropriate risk response strategies.
Security controls
In order to mitigate an information security risk, organisations put in place measures to safeguard their systems and data. These measures are called security controls. There are three main types of security controls: physical, technical, and administrative.
Physical controls
Physical controls are hardware devices and architectural features that address? process-based security needs. Physical controls aim to physically prevent or detect unauthorised access, damage, or interference to information systems. Examples of physical controls include:
?
Technical controls
Technical controls, also known as logical controls, are security measures that computer systems and networks implement directly. Technical controls aim to protect data in storage, data in transit, and data in use. Examples of technical controls include:
?
Administrative controls
Administrative controls, also known as managerial controls, are directives, guidelines, or advisories aimed at people within the organisation. Administrative controls aim to promote good security practices and ensure that employees are following security policies and procedures. Examples of administrative controls include:
?
By implementing physical, technical, and administrative controls, organisations can reduce their risk of security incidents and protect their information systems and data.
Governance
Information security governance refers to the system of policies, procedures, and regulations that an organisation puts in place to manage and protect its sensitive information. There are several key elements to information security governance that organisations must consider:
Overall, these governance elements work together to create a framework for effective information security management, ensuring that organisations comply with applicable regulations, adopt industry best practices, and manage risk effectively.
ISC2 Code of Ethics
If you are reading this article in preparation of the ISC2 Certification in Cyber-Security, you also need to be aware of the ISC2 Code of Ethics.
ISC2, the International Information System Security Certification Consortium, is a nonprofit organisation that provides education and certification in the field of information security. Its Code of Ethics sets the standards for ethical and professional behaviour that are expected of its members.
The Code of Ethics begins with a preamble that highlights the importance of adhering to the highest ethical standards of behaviour. It emphasises the responsibility that members have to protect society, the common good, public trust, and the infrastructure.
The ISC2 member is expected to act honourably, honestly, justly, responsibly, and legally. This means they must provide competent and diligent service to their principals, and they must not engage in any activity that could harm society, the public, or the infrastructure.
The ISC2 Code of Ethics provides a framework for ethical decision-making in the field of information security. It requires that members act with integrity, honesty, and responsibility in all aspects of their professional and personal lives. Violations of the Code of Ethics can result in disciplinary action, including the loss of certification.
Examples of violations of the Code of Ethics include engaging in unethical behaviour, such as hacking into computer systems, stealing confidential information, or engaging in fraudulent activity. It also includes failing to report security breaches or other incidents that could harm society, the public, or the infrastructure.
In summary, the ISC2 Code of Ethics provides a set of guidelines that members of the information security community must follow to ensure they act in an ethical and professional manner. Adhering to the Code of Ethics helps to maintain public trust and confidence in the profession, and it ensures that members of the information security community are held to the highest standards of behaviour.
?
Conclusion
Information security? is a crucial aspect of modern organisations, particularly as more and more business processes are becoming digitalised. In this article, we have discussed some of the fundamental concepts and practices that underpin information security , such as the CIA triad, risk management, security controls, governance elements, and Ethics.
By implementing the practices discussed in this article, organisations ensure that their sensitive data and critical systems are protected from cyber threats and other risks. Ultimately, effective information security? requires a holistic approach that involves people, processes, and technology, and that is continuously reviewed and updated in light of changing threats and business needs.
Check your readiness with a Quiz: https://forms.office.com/r/tqn18kS8A5
Disclaimer: This article is not legal or regulatory advice. You should seek independent advice on your legal and regulatory obligations. The views and opinions expressed in this article are solely those of the author. These views and opinions do not necessarily represent those of HSBC or its staff.
Currently I'm a Cyber security student at Moringa
6 个月It's Good content with nice practical examples
ISC2 Certified in Cybersecurity// Executive & Administrative Assistant// Boosting Productivity, Data security and efficiency through Expert Admin Support.
8 个月Thanks for sharing, I really appreciate this.
Cybersecurity CC | CISM | Information Security | IT Security | IT Infrastructure
9 个月Thanks, this really helpful..