BIE-UKB Lecture 01 Recall: Introduction to Cyber Security
Terms
- Information Security
- Dependability - the measure of RAMS parameters
- Reliability
- Availability
- Maintainability
- Safety/Security
- Some additional parameters: Durability
- EU Directives NIS (2016/1148), NIS 2 (2022/255), Czech Cyber Security Law (Law 181/2014)
- Event - vent, that may lead to a breach of security
- Incident - breach of security/integrity/availability in the system or service due to the cyber security event
- Cyber Threat
- Any event with the potential to adversely impact organizational operations (process) assets, or individuals through
- Basic Principles
- Defense in Depth
- Separation of Duty (SoD)
- Least Privilege/Need-to-know
Security (Counter)Measures
- Increase the attack costs - in terms of time or (any type of additional) expenses
- Technical Measures
- HW/SW used to detect or prevent security events/incidents
- Organizational Measures
- process supporting technical measures
- Methodology: Process + Roles
Fail-Safe vs. Fail-Secure
- default state is secure/safe
- sometimes in contradiction (layered approach to achieve both), sometimes complementary
Side-channel attacks
- 199(8)9 Kocher et. al.
- processed data could be guessed from time/power/EMC data dependency (RSA: length of operation depends on secret used key bits)
- AMD/Intel CPUs - Examples: Meltdown/Spectre
BIE-UKB Lecture 02 Notes: Risk Management
Risk Management
- process of identifying, assessing, and controlling threats
- PDCA Process: Plan-Do-Check-Act
- Aims:
- minimize, monitor and control the probability or impact of bad events
- minimize costs/resource utilization
- maximize opportunities
- Risk Analysis
- formal guidelines (one of many) ISO/IEC 27005
- internal methodology (!)
- Primary asset depends on Supporting asset
- primary asset is information/process/service essential for an organization enabled by a supporting asset
- hierarchical decomposition: scope/level
- Primary Asset Owner
- Primary Asset valuation:
- CIA Triad: Confidentiality, Integrity, Availability
- often RAMS parameters in parallel
- Vulnerability - a weakness or an opportunity, which can be exploited (probability + cost!)
- Risk - measure of danger severity (potential for loss or damage when threat exploits vulnerability)
- Synonyms sometimes used: Threat, Danger
- Accept
- Transfer
- Mitigate - reduce/minimize impact
- Avoid - disable (minimize probability)
- risk impact/probability chart or matrix
- Example - Research Project Risk Analysis:
- project with an implicitly limited scope, clear roles, and asset values
- risk catalog -> threat and vulnerability assessment is performed at the same time en-block (mentor-driven brainstorming)
- risk probabilities and severities are evaluated by Key project team members (Asset Owners)
- average over-risk probability (P) and severity (S) are computed for each risk
- overall risk measure/significance is computed as P*S
- overall risk is evaluated by thresholding
- multiple categories, not only technical/organizational risks