Sicheng Liu bio photo

Email

LinkedIn

Github

Security Management

Lecture

Cybersecurity is part of information security. Information security also focuses on physical and simulated format information, while cybersecurity does not.

Case

TJX

Unauthorized access to credit card

About data:

  • Need to take care with data
  • Data is a saleable commodity
  • Follow rules for our own protection
  • Criminals are getting smarter
  • Consider use of encryption

Factors Thought to Contribute to Vulnerability

  • Unpatched / Unprotected Software
  • Inadequate Staff Training
  • Poor Security Culture
  • Misconfigured Software

Common Cybersecurity Standards

  • ISO / IEC 27001
  • NIST Cybersecurity Framework
    • Identify
    • Protect
    • Detect
    • Respond
    • Recover
  • PCI DSS
  • HIPAA

Aspects of Security Management that are Proving to be a Challenge

  • Difficulty of changing attitudes of users to security
  • Keeping up to date with threats
  • Configuration management
  • Lack of understanding by senior management
  • Lack of commitment by senior management

Malware

Malware is an umbrella term used to refer to a variety of forms of hostile or intrusive software

Five categories of security threats:

  • Unintentional acts
  • Natural disasters
  • Technical failures
  • Management failures - Ineffective procedures and controls
  • Deliberate acts

Factors Making Security Harder

  • More complex systems
  • Criminals becoming cleverer
  • Crimes often not detected for long periods
  • Wide range of users, mostly non-expert
  • Management unaware of problems
  • Security measures ofter inconvenient
  • Costs substantial
  • Benefits hard to quantify

Business Continuity

Organization should be able to continue to function during a disaster, rather than simply trying to recover after a disaster has occurred.

  • Classifying business systems
    • Critical
    • Vital
    • Sensitive
    • Non-critical
  • Planning for business continuity
    • Backup procedures
    • Disaster recovery
    • System audit - Access plans

Reading

Cyber Security Threats and Attacks: All You Need to Know

What is a Cybersecurity Threat

A cybersecurity threat is a malicious and deliberate attack by an individual or organization to gain unauthorized access to another individual’s or organization’s network to damage, disrupt, or steal IT assets, computer networks, intellectual property, or any other form of sensitive data.

Types of Cybersecurity Threats

  • Malware
    • Including spyware, ransomware, viruses and worms
  • Phishing
    • Emails disguised as legitimate resources
    • Leading to malware installation or disclosure of sensitive information.
  • Spear phishing
    • Target on privileged users
  • Man in the middle attack
  • Denial of service attack (DoS)
  • SQL injection
    • Malicious SQL scripts.
  • Zero-dat exploit
    • Attack on public vulnerability before a patch or solution is implemented.
  • Advanced persistent threats (APT)
  • Ransomware
    • Attacker locks the victim’s data
    • Ask for paid
  • DNS attack
    • Attack on Domain Name System (DNS)
    • Divert site visitors to malicious pages
    • Remove data from compromised systems

Common Sources of Cyber Threats

  • Nation states
  • Criminal groups
  • Hackers
  • Terrorist groups
  • Hacktivists
  • Malicious insiders
  • Corporate spies
  • Cybersecurity Best Practices to Protect from Cyber Threats

  • Create an insider threat program
  • Train employees
  • Maintain complianceBuild a cyber incident response plan
  • Regularly update systems and software
  • Backup data
  • Initiate phishing simulations
  • Secure site with HTTPS

Cyber Security: How You Can Protect Your Company’s Assets with a Few Simple Steps

How Are Systems Attacked?

  • Vulnerabilities
  • Backdoors
  • DoS
  • Direct-access attack
  • Eavesdropping
  • Spoofing
  • Tampering
  • Privilege escalation
  • Phishing
  • Ransomware
  • Clickjacking
  • Social engineering
  • Botnet

Tips to Promote Cyber Security

  • Install patches
  • Practice password discipline
  • Leverage traditional and new antivirus software
  • Educate the team
  • Consider managed services - Cloud-based protection systems
  • Keep cyber security resources at hand
  • Promote a culture of forgiveness

Data Security 101: Understanding the Crisis of Data Breaches, and Best Practices to Keep Your Organization’s Data Secure

What is Data Security Protecting Against?

  • Security hackers
  • Malware
  • Computer viruses

What is Data Security Management?

  • Backups
  • Data masking
  • Data erasure
  • Encryption
  • Authentication
  • One-time password
  • Electronic security tokens
  • Two-factor authentication
  • Transparent data encryption
  • Cloud access security broker
  • Active directory rights management services
  • Big data security
  • Internet of things data security
  • Payments security, mobile app security, web browser security, email security