Lecture 1
1. Millenium bug → coding error
- years only in two numbers
2. Cambridge analytica → profiling
- personalizing advertisements
3. OPCW → hack attempt
- russia accused of cyber-attack on chemical weapons watchdog
4. Diginotar → trust issue
- .
5. Maastricht University → ransomware attack
- .
6. Grindr → selling data
7. Stuxnet → sabotage
8.
Cyber (in)security) as a threat to
- individuals
- groups/organizations
- nations
- international community
What is cyberspace?
→ composed of all the computerized networks in the world, as well as of all computerized
end points, including telecommunications networks, special purpose networks, the internet,
computer systems, and computer-based systems. The concept also includes the information
stored, processed, and transmitted on the devices and between these networks
What is cybersecurity?
→ comprises technologies, processes and controls that are designed to protect systems,
networks and data from cyber attacks
→ effective cyber security reduces the risk of cyber attacks, and protects organizations and
individuals from the unauthorized exploitation of systems,
networks and technologies
‘if it works, nothing happens’
- Is there a threat or are actors not interested?
- how can we tell?
- focus on measurable outcomes
Why do we care?
- protection of critical national infrastructure
- privacy and sensitive data
- financial reasons
Three-layer model
……
,Protection of Data: CIA-triad
- confidentiality
- integrity
- availability
Confidentiality
→ information only available to authorised entities
→ not only through hacking
→ also:
- wrong attachment in an email
- data screens in public displays
- materials not removed correctly (e.g. secure bins)
Integrity
→ can we trust the data, the whole data and nothing but the data?
→ no changes made to data without detection
- changing data
- adding data
- deleting data
Availability
→ data is available when needed
→ systems up and running
→ people who should have access, do have access
So what about the following?
1. Maastricht University (ransomware attack)
2. Grindr HIV (data sale)
3. Millennium bug (coding error)
4. Strava (publishing data)
Data backup
- what would you lose if your computer crashed?/ what if your laptop got stolen?/
house burns down
→ 3-2-1
- 3 copies
- 2 local
- 1 far away
→ dropbox etc., usb
Multi-factor authentication (usually 2)
→ something you:
- know (password)
- have (token, bank card)
- are (fingerprint, iris, facial)
,Upside: increased security
Downside: often a (bit more) fuss
VPN → Virtual Private Network
- secure connection over unsecure network
- When would you want one?
- Do you have one?
- What are possible dangers?
End-to-end encryption
- you already have it
- what is it
- do we want it
Public-key encryption
→ create pairs of keys: ‘public’ and ‘private’ key
- share the public key, keep private key secret
→ used to encrypt/decrypt messages (private key)
Encryption
- not just messages, but files as well
- helps with the CIA triad!
- also helps in starting a cyber attack…
- ransomware
, Readings Lecture 1
Meeuwisse
Cybersecurity for beginners
1. Cybersecurity & its origins
EMP = electromagnetic pulse
→ organizations collect information to gain power
Cybersecurity = the protection of digital devices and their communication channels to keep
them stable, dependable and reasonably safe from danger or threat. Usually the required
protection level must be sufficient to prevent or address unauthorized access or intervention
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.
Digital device = any electronic appliance that can create, modify, archive, retrieve or transmit
information in an electronic format. Desktop computers, laptops, tablets, smartphones and
Internet-connected home devices are all examples of digital devices.
Defense in depth = the use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on defense
in depth is that security techniques must also consider people and operations (for example
processes) factors and not just technology.
Virus = a form of malicious software that spreads by infecting (attaching itself) to other files
and usually seeks opportunities to continue that pattern. Viruses are now less common than
other forms of malware. Viruses were the main type of malware in very early computing. For
that reason, people often refer to something as a virus when it is technically another form of
malware
→ The transformation that gave rise to cybersecurity threats was mostly driven by one key
factor: Internet connection speeds became faster, cheaper and more widely adopted, even in
less economically developed countries.
Darwin effect = Those who adapted to the advantages of connected technologies were (and
are) gaining advantages and thriving. Those organizations that were (and are) not evolving
to use connected technologies are mostly shrinking or perishing.
Cryptanalysis = the art of examining ciphered information to determine how to circumvent
the technique that was used to encode or hide it. Analyzing ciphers.
The cloud = An umbrella term used to identify any technology service that uses software and
equipment not physically managed or developed by the person or organization (customer)
using it. This usually provides advantages of on-demand scalability at lower cost. Examples
1. Millenium bug → coding error
- years only in two numbers
2. Cambridge analytica → profiling
- personalizing advertisements
3. OPCW → hack attempt
- russia accused of cyber-attack on chemical weapons watchdog
4. Diginotar → trust issue
- .
5. Maastricht University → ransomware attack
- .
6. Grindr → selling data
7. Stuxnet → sabotage
8.
Cyber (in)security) as a threat to
- individuals
- groups/organizations
- nations
- international community
What is cyberspace?
→ composed of all the computerized networks in the world, as well as of all computerized
end points, including telecommunications networks, special purpose networks, the internet,
computer systems, and computer-based systems. The concept also includes the information
stored, processed, and transmitted on the devices and between these networks
What is cybersecurity?
→ comprises technologies, processes and controls that are designed to protect systems,
networks and data from cyber attacks
→ effective cyber security reduces the risk of cyber attacks, and protects organizations and
individuals from the unauthorized exploitation of systems,
networks and technologies
‘if it works, nothing happens’
- Is there a threat or are actors not interested?
- how can we tell?
- focus on measurable outcomes
Why do we care?
- protection of critical national infrastructure
- privacy and sensitive data
- financial reasons
Three-layer model
……
,Protection of Data: CIA-triad
- confidentiality
- integrity
- availability
Confidentiality
→ information only available to authorised entities
→ not only through hacking
→ also:
- wrong attachment in an email
- data screens in public displays
- materials not removed correctly (e.g. secure bins)
Integrity
→ can we trust the data, the whole data and nothing but the data?
→ no changes made to data without detection
- changing data
- adding data
- deleting data
Availability
→ data is available when needed
→ systems up and running
→ people who should have access, do have access
So what about the following?
1. Maastricht University (ransomware attack)
2. Grindr HIV (data sale)
3. Millennium bug (coding error)
4. Strava (publishing data)
Data backup
- what would you lose if your computer crashed?/ what if your laptop got stolen?/
house burns down
→ 3-2-1
- 3 copies
- 2 local
- 1 far away
→ dropbox etc., usb
Multi-factor authentication (usually 2)
→ something you:
- know (password)
- have (token, bank card)
- are (fingerprint, iris, facial)
,Upside: increased security
Downside: often a (bit more) fuss
VPN → Virtual Private Network
- secure connection over unsecure network
- When would you want one?
- Do you have one?
- What are possible dangers?
End-to-end encryption
- you already have it
- what is it
- do we want it
Public-key encryption
→ create pairs of keys: ‘public’ and ‘private’ key
- share the public key, keep private key secret
→ used to encrypt/decrypt messages (private key)
Encryption
- not just messages, but files as well
- helps with the CIA triad!
- also helps in starting a cyber attack…
- ransomware
, Readings Lecture 1
Meeuwisse
Cybersecurity for beginners
1. Cybersecurity & its origins
EMP = electromagnetic pulse
→ organizations collect information to gain power
Cybersecurity = the protection of digital devices and their communication channels to keep
them stable, dependable and reasonably safe from danger or threat. Usually the required
protection level must be sufficient to prevent or address unauthorized access or intervention
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.
Digital device = any electronic appliance that can create, modify, archive, retrieve or transmit
information in an electronic format. Desktop computers, laptops, tablets, smartphones and
Internet-connected home devices are all examples of digital devices.
Defense in depth = the use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on defense
in depth is that security techniques must also consider people and operations (for example
processes) factors and not just technology.
Virus = a form of malicious software that spreads by infecting (attaching itself) to other files
and usually seeks opportunities to continue that pattern. Viruses are now less common than
other forms of malware. Viruses were the main type of malware in very early computing. For
that reason, people often refer to something as a virus when it is technically another form of
malware
→ The transformation that gave rise to cybersecurity threats was mostly driven by one key
factor: Internet connection speeds became faster, cheaper and more widely adopted, even in
less economically developed countries.
Darwin effect = Those who adapted to the advantages of connected technologies were (and
are) gaining advantages and thriving. Those organizations that were (and are) not evolving
to use connected technologies are mostly shrinking or perishing.
Cryptanalysis = the art of examining ciphered information to determine how to circumvent
the technique that was used to encode or hide it. Analyzing ciphers.
The cloud = An umbrella term used to identify any technology service that uses software and
equipment not physically managed or developed by the person or organization (customer)
using it. This usually provides advantages of on-demand scalability at lower cost. Examples