Foundational cybersecurity concepts
This sections introduces core and foundational cybersecurity concepts and practices such as confidentiality, integrity, and availability (the CIA triad)
Learning objectives
Become familiar with key cybersecurity concepts and practices
Learn key cybersecurity definitions
Describe where cybersecurity fits within corporate organizational structures
Understand how cybersecurity is practiced within organizations
This section introduces cybersecurity concepts and practices germane to any instruction aiming to establish a practical understanding of the goals of cybersecurity and how it is practiced within organizations. This section covers definitions of information security, the CIA triad, risk, threat, vulnerability, mitigation, and the AAA framework (Authentication, Authorization, and Accounting).
Topics covered in this section
Information security definition
The place of information security in enterprise IT governance
Confidentiality, Integrity, and Availability (CIA) of information
Information security risk management
Techniques of CIA attacks
CIA attacks mitigation technologies
Other foundational information security concepts
Information security definition
The terms information security, cybersecurity, Internet security, computer security, and network security have intersecting and evolving meanings, but generally refer to processes of implementing security controls including IA (Information Assurance)/IT governance frameworks to protect the confidentiality, integrity, and availability of privileged information as well as the technological infrastructure of a computer network or system against unauthorized access or manipulation (Anderson, 2003; Blakley, McDermott & Geer, 2001; Cherdantseva & Hilton, 2013; CNSS, 2010; ISACA, 2008; ISO/IEC 27000:2009; Venter & Eloff, 2003).
Sensitive data should be protected based on the potential impact of a loss of confidentiality, integrity, or availability. Confidentiality refers to protecting information from being accessed by unauthorized parties. Integrity refers to ensuring the authenticity of informationβthat information is not altered, and that the source of the information is genuine. Availability of information means that information is accessible by authorized users when needed.
Information security is βa risk management discipline" (Blakley et al., 2001) focused on identifying information assets, associated risks, and suitable mitigation methods. An asset is any hardware, software, information system, network, or database which an organization uses to achieve its business goals.
Information security,
βpreserves the confidentiality, integrity and availability of informationβ (ISO/IEC 27000:2009);
is concerned with βauthenticity, accountability, non-repudiation and reliabilityβ (ISO/IEC 27000:2009);
ensures that βonly authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability)β (ISACA, 2008);
is concerned with both the protection of information as well as the of technological infrastructure or information systems (Cherdantseva & Hilton, 2013; CNSS, 2010);
is concerned with access to information (CNSS, 201; ISACA, 2008); and
aims to provide assurance βthat information risks and controls are in balanceβ (Anderson, J., 2003).
Key information security concepts include privacy, authenticity and trustworthiness, non-repudiation, accountability and auditability, and reliability (Cherdantseva & Hilton, 2013; ISO/IEC 27000:2009).
The broad pragmatic goal of information security is to reduce the probability of unauthorized access or damage to the confidentiality, integrity, and availability of valued information assets to an acceptable risk level through risk mitigation strategies that involve management controls (e.g., security policies), technical controls (e.g., intrusion detection techniques), and operational controls (best practices/standard operating procedures).
Information security threats most commonly rated as a concern in higher education in North America are as follows. Confidentiality attacks: Exposure of confidential or sensitive information (79%); Integrity attacks: Unauthorized or accidental modification of data (29%); Availability attacks: Loss of availability or sabotage of systems (16%); Mixed threat attacks: Email viruses, ransomware, or other malware (31%); and Unauthorized, malicious network/system access (27%) (EDUCAUSE Information Security Almanac, April 2019, p. 2).
The place of information security in enterprise IT governance
Information security governance is the top-level enterprise business function accountable for information security under the rubric of IT governance (NCC 2005 IT Governance). The IT department is a customer of the information security governance function or service, (e.g., HR, Finance).
IT security as integrated with enterprise-wide risk management policy operates within the information security governance framework. Information security is a specialized function within business organizations focused on securing an organizationβs information assets against unauthorized access or damage. An information security professional from IT ensures an institutionβs IT system is operating in a way that meets varied regulatory requirements and stakeholder needs.
IT security is a stakeholder level concern within enterprises and is concerned with Internet access and identity and access management, and the technological infrastructure of the IT network and its smooth operation. Information security governance is concerned with defining security policy and aligning security strategy with business strategy.
Information Systems are comprised of hardware, software, and communications βwith the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: Physical, personal and organizationalβ (Cherdantseva & Hilton, 2013).
Areas for which central IT most commonly has primary responsibility in higher education are Network security (94%), Monitoring (88%), Communications security (86%), and Identity management (83%) (EDUCAUSE Information Security Almanac, April 2019).
Confidentiality, Integrity, and Availability (CIA) of information
The most concrete (as opposed to abstract) and tactical (as opposed to strategic) goal of information security is the protection of the confidentiality, integrity, and availability of information assets. By comparison, the most strategic goal of information security in an enterprise is to support the enterprise's strategic vision and mission. The principles of the CIA triad form the foundation of security. These three principles help ensure that data is protected, accurate, and accessible when needed.
Confidentiality denotes an imperative that only authorized users should be able to access privileged/private data.
Integrity denotes an imperative that data should not be changed or modified by unauthorized users. Data should be correct and authentic.
Availability denotes an imperative that an information system should be operational and accessible to authorized users. For example, staff should be able to access the internal resources they need to perform their duties, and the companyβs website should be up and running and available to customers.
In addition to the CIA triad, closely related and foundational information security concepts include:
A vulnerability is any potential weakness that can compromise the CIA of information assets. A window in a house is a vulnerability burglars can exploit to enter the house.
An exploit is something that can potentially be used to exploit the vulnerability. A rock can exploit the weakness of glass windows and may be used to enter a house.
A threat is the potential of a vulnerability to be exploited. The threat of house burglary is the potential a burglar will exploit the glass window vulnerability using a rock (or other exploits) to gain entry into a house.
A threat vector is a means or method a threat actor can use or follow to exploit a vulnerability. A glass window a burglar can use to gain entry into a house can be considered a threat vector.
A mitigation technique is something that can protect against threats. Appropriate mitigation techniques should be implemented everywhere a vulnerability can be exploited, for example, devices, servers, switches, and routers. In our window example, adding welded metallic bars would be a mitigation technique.
Information security risk management
Risk management requires understanding threats, vulnerabilities, and mitigation strategies.
Risk = Threat Γ Vulnerability (with consideration of mitigation)
A risk arises when a threat exploits a vulnerability.
Related concepts: exploit (how the attack happens) and threat vector (the pathway of the attack).
Risk is βa threat that exploits some vulnerability that could cause harm to an assetβ (Peltier, 2005, p.16). βOne instance of risk within a system is represented by the formula (asset*threat*vulnerability)β (Landoll & Landoll, 2005, p. 8).
The Risk Management Guide of the National Institute of Standards and Technology defines risk assessment as βthe process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impactβ (Landoll & Landoll, 2005, p. 10).
According to the General Security Risk Assessment Guidelines, ASIS International (2003), the basic components of a risk assessment plan include, identifying assets, specifying loss events (threats), assessing the frequency and impact of events, recommending mitigation options, conducting a cost/benefit analysis, and making decisions.
Sources of Vulnerabilities
Computer system vulnerabilities can be categorized based on their origin:
Software infrastructure: Flaws in applications, operating systems, or firmware.
Network infrastructure: Weaknesses in network devices, network protocols, or configurations.
Hardware: Physical security flaws or insecure device designs.
Organizational and network policies: Poorly defined security policies that create security gaps.
Human factors: Susceptibility to social engineering or lack of security awareness.
Configuration mistakes: Unsecured endpoints, default passwords, or misconfigured devices.
Information security in practice
Pragmatically, organizations approach information security in terms of risk, threat, vulnerability, and mitigation. Organizations take a risk-based approach to information security management.
A standard definition of risk is the potential to lose something of value. Another definition involves the exposure to danger. In information security, risk is typically understood as threat times vulnerability times impact (the likelihood that a threat will exploit a vulnerability resulting in a business impact), or threat times vulnerability with an overlay of control effectiveness. The cybersecurity risk manager should determine what is the suitable definition of risk.
A risk-based approach allows an organization to prioritize the vulnerabilities identified and focus its efforts on the risks that are the most significant to its operations. The first step in identifying business risks should be to understand the business as a social systemβits identity, corporate vision, social/community relations, and values. Clause 4 of ISO 22301 calls for understanding internal and external environments, including an organizationβs activities, functions, services, and the organizationβs risk appetite (ISO 22301 Portal: Societal security β Business continuity management system, 2015). Businesses need to evaluate information security risks for the purposes of insurance underwriting and resource allocation; or if they are attempting to comply with HIPAA, PCI, and other regulations, they will perform a risk assessment periodically.
Risk assessment βidentifies risks generated by the possibility of threats acting on vulnerabilities, and what can be done to mitigate each oneβ (PCI DSS Risk Assessment Guidelines, 2005). Several major regulatory frameworks, including HIPAA, PCI, and SSAE 16, require businesses to perform periodic risk assessment. As such, risk assessments are usually performed in the context of compliance with standards or regulations.
In order to properly secure data, an organization should develop clear and precise standards of data classification. To simplify data governance, information should be segregated by levels of importance and risk, since it is impractical to safeguard all the data in an organization using the same standards. Sensitive data should be protected by more security measures in order to safeguard it.
A key risk management challenge is prioritizing risk for optimal investment in countermeasures. A well-understood list of risks must be matched with a list of suitable mitigations for those risks. ISO Risk Management Guide 73:2009 defines risk management as follows:
In ideal risk management, a prioritization process is followed whereby the risks with the greatest loss (or impact) and the greatest probability of occurring are handled first, and risks with lower probability of occurrence and lower loss are handled in descending order. In practice the process of assessing overall risk can be difficult, and balancing resources used to mitigate between risks with a high probability of occurrence but lower loss versus a risk with high loss but lower probability of occurrence can often be mishandled.
Acceptable risk
In the context of assessing information security risk, risk level is assessed (scored) based on likelihood and impact - meaning, the higher the probability of an attack or breach, the higher the risk; and the higher the potential impact of an attack or breach, the higher the risk.
Risk assessments outlines what threats exist to specific assets and the associated risk levels. Risk mangers use risk levels to select appropriate security defenses and countermeasures to lower the risk to an acceptable level (Engebretson, 2011; Landoll & Landoll, 2005; Peltier, 2005).
After a risk assessment, a risk can be accepted (this involves an evaluation of whether the cost of countermeasures outweighs the potential cost of loss due to the threat), mitigated (this involves implementing safeguards and countermeasures to eliminate vulnerabilities or to block threats), or transferred (this involves transferring the cost of the threat to another business function or unit) (Stewart, 2012).
The goal of risk assessment is βto identify which investments of time and resources will best protect the organization from its most likely and serious threatsβ (Reynolds, 2012, p. 103).
Systems can be more secure or less secure, but there is no absolute security. For example, you can implement malware detection on your network firewall and have the best antivirus software on client PCs, but the chance of the PCs getting infected with malware is never zero.
Security vs functionality
Data that is not accessible to anyone may be perfectly secure, but itβs worthless to an enterprise if it cannot be seen and used. A security access policy is always trying to balance security and functionality (or access privileges).
Techniques of CIA attacks
Confidentiality attacks
A confidentiality attack is a type of cyberattack aimed at gaining unauthorized/unlawful access to privileged/private information. These attacks exploit vulnerabilities in systems, networks, or human behavior to access confidential data such as personal records, financial details, or trade secrets. Common attack techniques that compromise confidentiality include:
Packet sniffing (packet capture): Attackers intercept and analyze network traffic to extract sensitive information (e.g., using tools like Wireshark or tcpdump). For example, an attacker on an unsecured Wi-Fi network could capture unencrypted login credentials.
Port scanning: Attackers scan a target systemβs open ports (e.g., using Nmap) to identify vulnerable services. While port scanning itself does not directly steal data, it is often a precursor to exploitation (e.g., targeting an open SSH port to brute-force a password).
Wiretapping (eavesdropping): Attackers secretly monitor communications, such as phone calls (traditional wiretapping) or unencrypted VoIP traffic. Modern variants include man-in-the-middle (MITM) attacks, where an attacker intercepts and possibly alters data exchanged between two parties.
SQL injection: Malicious code is injected into a database query to extract unauthorized information from a vulnerable system.
SSL/TLS stripping (HTTPS downgrade)
Technique: An attacker forces a victimβs browser to downgrade an encrypted HTTPS connection to unencrypted HTTP using tools like sslstrip.
Impact: Login credentials or session cookies are transmitted in plaintext, allowing interception (e.g., on public Wi-Fi).
These techniques undermine confidentiality by exposing data to unauthorized entities, whether through passive interception (e.g., sniffing) or active exploitation (e.g., credential theft).
Integrity attacks
An information integrity attack is a malicious attempt to alter, modify, or corrupt data to deceive users, disrupt operations, or cause harm. The goal is to make data inaccurate or unreliable. Information sabotage through viruses, malware, or unauthorized modifications constitutes an integrity attack, as it compromises the accuracy, consistency, and reliability of data (Bishop, 2003; Pfleeger & Pfleeger, 2015). Common attack techniques that compromise integrity include:
Session hijacking: An attacker takes over an active session (e.g., a logged-in userβs web session) to manipulate or falsify data.
Example: Using cross-site scripting (XSS) or session fixation to steal a userβs session cookie, allowing the attacker to alter account details in a banking system.
Man-in-the-middle (MITM) attacks: An attacker intercepts and alters communications between two parties without their knowledge.
Example: Using ARP spoofing or SSL stripping to modify transaction details in real time (e.g., changing a recipientβs bank account number during an online transfer).
Data tampering via malware: Malicious software (e.g., ransomware, rootkits, or logic bombs) corrupts or falsifies data.
Example: The Stuxnet worm manipulated industrial control systems by altering programmable logic controller (PLC) code, causing physical damage.
SQL injection: A hacker injects malicious SQL code into a database query to modify, delete, or corrupt data.
Unlike confidentiality attacks (which focus on unauthorized access), integrity attacks ensure that even if data is accessed, it cannot be trusted due to unauthorized modifications.
Availability attacks
An information availability attack aims to disrupt access to data, systems, or services, making them unavailable to legitimate users. These attacks often involve overwhelming a system or blocking access. A denial-of-service (DoS) attack targets the availability of information systems, rendering them inaccessible to legitimate users (Stallings & Brown, 2018; Skoudis & Liston, 2005). Ransomware is another availability attack where attackers encrypt a victimβs data and demand payment to restore access, effectively denying service until the ransom is paid (e.g., WannaCry or LockBit). Common attack techniques that compromise availability include:
SYN flood attack: A SYN flood attack exploits the TCP three-way handshake by flooding a target with SYN packets (often from spoofed IPs). The server allocates resources for each request and sends SYN-ACKs, but the attacker never completes the handshake with the final ACK. This exhausts the serverβs connection queue, denying service to legitimate users.
Impact: Overwhelms a web server, causing it to drop legitimate connections (e.g., disrupting an e-commerce site during peak sales).
ICMP flood (ping flood) attack: The target is bombarded with fake ICMP Echo Request (ping) packets, consuming bandwidth and processing power.
Impact: Slows down or crashes network devices (e.g., routers), making services unreachable.
Distributed denial-of-service (DDoS) attack: A coordinated large-scale attack using multiple compromised systems (e.g., a botnet) to amplify traffic and cripple targets.
Example: The Mirai botnet attack (2016) exploited IoT devices to take down major websites like Twitter and Netflix.
Ransomware attack: Encrypting critical data and demanding payment to restore access.
Physical infrastructure sabotage: Cutting network cables or destroying servers to halt operations.
CIA attacks mitigation technologies
Technologies for Confidentiality, Integrity, and Availability
Security Objective
Key Technologies
Purpose
Notes
Confidentiality
Data Loss Prevention (DLP)
Encryption (AES, TLS, PGP)
Access Controls (IAM, RBAC, AAA)
Tokenization
SIEM
Backups
Rate Limiting (prevents brute-force attacks)
Protects data from unauthorized access and leaks
SIEM provides monitoring for all three pillars
Integrity
Hashing (SHA-256, HMAC)
Digital Signatures
Version Control (Git, SVN)
SIEM + Centralized Logging
Access Controls (audit logs track changes)
Backups (ensure clean restore points)
Ensures data accuracy and prevents tampering
Access controls support integrity through audit trails
Availability
DDoS Protection (Cloudflare, AWS Shield)
Backups (recovery, 3-2-1 Rule, immutable backups)
Load Balancers (Nginx, F5)
High Availability systems
SIEM
Access Controls (MFA)
Rate Limiting (secures APIs)
Maintains system uptime and access
Rate limiting protects both availability and confidentiality
See CIA attacks mitigation technologies
Confidentiality mitigation technology in focus: Data Loss Prevention (DLP)
A key technology for ensuring data confidentiality is Data Loss Prevention (DLP), which monitors and protects sensitive information by detecting and blocking unauthorized transfers. For instance, DLP can trigger alerts if confidential files are copied to removable drives or if payment card data is shared improperly. While highly effective, DLP requires careful configurationβincluding accurate data classification and tailored alert rulesβto maximize its security value.
How DLP Monitors and Blocks Unauthorized Data Transfers
Content-Centric Detection DLP systems scan data at rest (e.g., databases), in use (e.g., open files), and in motion (e.g., emails, cloud uploads) for sensitive content. DLP systems use techniques like:
Pattern matching (e.g., credit card/PII regex).
File fingerprinting (e.g., exact matches of proprietary designs).
Machine learning (e.g., identifying confidential documents by context).
Policy-Driven Blocking When DLP detects policy violations (e.g., an employee attaching customer data to an external email), it can:
Block the action outright (like preventing file copies to USB).
Quarantine the data for review.
Encrypt sensitive content mid-transfer.
Targeted Alerting DLP generates specific alerts for policy breaches (e.g., "Unauthorized SharePoint export of HR records"). These alerts can:
Feed into broader security systems (e.g., SIEMs for correlation).
Trigger automated workflows (e.g., notifying compliance teams).
DLP operates at the data layerβunderstanding content, not just traffic or behaviorβmaking it uniquely effective against insider threats and accidental leaks.
Open-Source & Freemium DLP Tools
MyDLP (Community Edition)
Network/email DLP with basic policies (e.g., credit card detection).
OpenDLP
Scans endpoints for sensitive files (no real-time blocking).
Spyderbat (Behavioral DLP)
Open-source runtime monitoring for data exfiltration.
Apache Nifi + Regex Policies
Custom DIY DLP using workflows to filter sensitive data in transit.
Commercial DLP Solutions
Symantec Data Loss Prevention (Broadcom)
Comprehensive coverage (network, endpoint, cloud).
Strong regulatory compliance (GDPR, HIPAA, PCI-DSS).
Microsoft Purview Data Loss Prevention
Native integration with M365, Azure, and Windows endpoints.
Uses AI for content classification (e.g., sensitive docs in SharePoint).
Forcepoint DLP
Focuses on behavioral analytics (e.g., detects risky user actions).
Supports hybrid cloud/on-prem deployments.
Digital Guardian
Endpoint-centric with advanced threat response (blocks USB/exfiltration).
Cloud-Native & Integrated Tools
Google Workspace DLP (for Gmail/Drive)
AWS Macie (ML-based S3 data classification)
Nightfall.ai (API-driven DLP for SaaS apps)
Integrity mitigation technology in focus: Centralized logging
Several centralized logging technologies can enhance security and compliance by aggregating logs from multiple sources for monitoring, analysis, and auditing. Some key solutions include:
1. SIEM (Security Information and Event Management) Systems
Splunk β Powerful log aggregation, real-time analysis, and alerting.
IBM QRadar β Combines logs with threat intelligence for security monitoring.
Microsoft Sentinel β Cloud-native SIEM with AI-driven threat detection.
Elastic SIEM (Elastic Stack / ELK Stack) β Open-source option using Elasticsearch, Logstash, and Kibana (ELK) for log parsing and visualization.
2. Log Management & Analytics Platforms
Graylog β Open-source log aggregation with alerting and dashboards.
Datadog β Cloud-based monitoring with log correlation and APM.
Sumo Logic β SaaS-based log analytics with machine learning insights.
Fluentd / Fluent Bit β Lightweight log collectors that integrate with other tools.
3. Cloud-Native & Enterprise Solutions
AWS CloudTrail + Amazon CloudWatch Logs β For AWS environments.
Google Cloud Logging β Centralized logging for GCP services.
Azure Monitor Logs β Log analytics for Microsoft Azure.
Syslog-ng / Rsyslog β Traditional Unix-based log forwarders.
Key Features to Look For:
Real-time log aggregation (from servers, applications, network devices).
Retention & compliance (long-term storage for audits).
Search & analytics (to detect anomalies or breaches).
Alerting & automation (trigger responses to suspicious activity).
Free/Open-Source vs. Commercial Tools
SIEM Systems
Splunk
Commercial
Powerful commercial platform. A free version (Splunk Free) exists with a daily data cap.
IBM QRadar
Commercial
Enterprise-grade commercial SIEM.
Microsoft Sentinel
Commercial
Cloud-native SaaS solution, billed based on data ingestion.
Elastic SIEM (ELK Stack)
Open Source
The core Elasticsearch, Logstash, and Kibana stack is open-source. Elastic offers paid commercial features and support.
Log Management & Analytics
Graylog
Open Source
The core Graylog product is open-source. An enterprise version with advanced features is available.
Datadog
Commercial
Commercial SaaS platform with usage-based pricing.
Sumo Logic
Commercial
Commercial SaaS platform with usage-based pricing.
Fluentd / Fluent Bit
Open Source
Cloud-native CNCF-graduated open-source projects.
Cloud-Native & Enterprise
AWS CloudTrail + CloudWatch
Commercial
Part of AWS's paid ecosystem. Pricing is based on events and log storage.
Google Cloud Logging
Commercial
Part of GCP's paid ecosystem. Includes a free tier with monthly allowances.
Azure Monitor Logs
Commercial
Part of Microsoft Azure's paid ecosystem. Billed based on data ingestion and retention.
Syslog-ng / Rsyslog
Open Source
Standard, free, and open-source log forwarders available on most Unix/Linux systems.
Clarifications:
Freemium Models: Several tools listed as "Commercial" (like Splunk, Datadog, and the cloud platforms) offer generous free tiers or free plans for low-volume use, but their full-featured enterprise versions are paid services.
Open Core Models: Tools like Elastic SIEM and Graylog have strong open-source cores. However, the companies behind them also sell commercial extensions (like advanced security features, supported plugins, and professional support), which is a common business model in the open-source world.
Cloud Services: While the underlying technology of tools like Fluentd is open source, the managed services from AWS, GCP, and Azure (CloudWatch, Google Cloud Logging, Azure Monitor) are commercial products.
Availability mitigation technology in focus: DDoS protection services (e.g., AWS Shield, Cloudflare)
Data can become unavailable due to being damaged or destroyed, or due to ransomeware or dormant malware. Unlike confidentiality or integrity attacks, availability attacks aim primarily to disrupt service rather than steal or alter data. Mitigation strategies include rate limiting, traffic filtering, and cloud-based DDoS protection services (e.g., AWS Shield, Cloudflare).
Availability attacks, such as Distributed Denial of Service (DDoS) attacks, aim to disrupt services by overwhelming systems with malicious traffic, rendering data or applications inaccessible. To counter these threats, organizations leverage cloud-based DDoS protection services like AWS Shield and Cloudflare, which employ advanced mitigation techniques such as traffic filtering, rate limiting, and anomaly detection. AWS Shield provides automatic protection for AWS resources, defending against common network-layer attacks, while Cloudflareβs global Anycast network absorbs and disperses malicious traffic before it reaches the target. These services ensure high availability by continuously monitoring and mitigating attack traffic, allowing legitimate requests to proceed uninterrupted. By integrating such solutions, businesses can maintain operational resilience against increasingly sophisticated DDoS campaigns.
Other foundational information security concepts
The AAA framework
AAA stands for Authentication, Authorization, and Accounting. Itβs a framework for controlling and monitoring users of a computer system such as a network.
Authentication is the process of verifying a userβs identity. When a user logs in, ideally using multi-factor authentication, thatβs authentication. In other words, Authentication is how you control access to your network and prevent intrusions, data loss, and unauthorized users.
Authorization is the process of granting the user the appropriate access and permissions. So, granting the user access to some files and services, but restricting access to other files and services, is authorization.
Accounting is the process of recording the userβs activities on the system. For example, logging when a user makes a change to a file, or recording when a user logs in or logs out, is accounting.
Enterprises typically use an AAA server to provide AAA services. ISE (Identity Services Engine) is Ciscoβs AAA server. AAA servers typically support the following two AAA protocols for network access control: 1) RADIUS (Remote Authentication Dial-In User System), which is an open standard protocol and uses UDP ports 1812 and 1813; and 2) TACACS+ (Terminal Access Controller Access-Control System Plus), which is also an open standard (that was developed by Cisco) and uses TCP port 49.
Foundational cryptography concepts
The primary goals of cryptography are confidentiality, authentication, data integrity, and non-repudiation.
Confidentiality protects information from unauthorized access.
Authentication verifies the identity of users and the authenticity of data.
Data integrity guarantees that information remains unaltered by unauthorized parties, ensuring its accuracy.
Non-repudiation ensures that a party cannot later deny having performed an action (such as sending a message or approving a transaction). It provides irrefutable evidenceβthrough digital signatures, timestamps, or audit logsβthat a specific user took a particular action, preventing false denials and holding parties accountable.
Key takeaways
The core, tactical goal of information security is to protect the Confidentiality, Integrity, and Availability (CIA Triad) of information assets.
Information security is a risk management discipline focused on identifying assets, associated risks, and implementing suitable mitigation controls (management, technical, and operational).
Key related concepts form the foundation of risk management:
A vulnerability is a weakness that can be exploited.
A threat is the potential for a vulnerability to be exploited.
Risk is the likelihood that a threat will exploit a vulnerability, resulting in a negative impact.
Organizations take a risk-based approach to prioritize vulnerabilities and focus mitigation efforts on the most significant risks to business operations, often driven by compliance requirements.
Information security governance is a top-level business function accountable for defining security policy and aligning security strategy with business objectives, while IT security is a stakeholder-level concern focused on the technological infrastructure.
There is no absolute security; the goal is to reduce risk to an acceptable level through mitigation, acceptance, or transfer, while balancing security needs with system functionality.
The AAA framework (Authentication, Authorization, and Accounting) is essential for controlling and monitoring access to systems and data.
Foundational cryptography provides the technical mechanisms to achieve the core security goals of confidentiality, integrity, authentication, and non-repudiation.
References
Anderson, J. M. (2003). Why we need a new definition of information security. Computers & Security. 22 (4): 308β313. doi:10.1016/S0167-4048(03)00407-3.
ASIS International. (2003). General Security Risk Assessment Guidelines.
Bishop, M. (2003). Computer security: art and science. Addison-Wesley Professional.
Blakley, B., McDermott, E., & Geer, D. (2001, September). Information security is information risk management. In Proceedings of the 2001 workshop on New security paradigms (pp. 97-104). ACM.
Cherdantseva, Y. & Hilton, J. (2013). Information security and information assurance. The discussion about the meaning, scope and goals. In: Organizational, Legal, and Technological Dimensions of Information System Administrator. Almeida F., Portela, I. (eds.). IGI Global Publishing.
CNSS (Committee on National Security Systems). (2010). National Information Assurance (IA) Glossary, CNSS Instruction No. 4009, 26 April 2010.
EDUCAUSE Information Security Almanac 2019. (April 10, 2019). Retrieved January 21, 2020, from https://library.educause.edu/resources/2019/4/the-educause-information-security-almanac-2019
Engebretson, P. (2011). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy. [Books24x7 version] Retrieved March 26, 2013, from http://common.books24x7.com.proxy.bib.uottawa.ca/toc.aspx?bookid=44730
ISACA. (2008). Glossary of terms, 2008. Retrieved January 21, 2020, from http://www.isaca.org/Knowledge-Center/Documents/Glossary/glossary.pdf
ISO/IEC 27000:2009. Information technology β Security techniques β Information security management systems β Overview and vocabulary.
ISO 22301 Portal. (2015). Societal security β Business continuity management system.
ISO Risk Management Guide. (2009). Risk management β Vocabulary (ISO Guide 73:2009).
Landoll, D. J., & Landoll, D. (2005). The security risk assessment handbook: A complete guide for performing security risk assessments. CRC Press.
NCC (National Computing Centre). (2005). IT Governance: Developing a Successful Governance Strategy (published by ISACA). Retrieved August 20, 2019, from http://m.isaca.org/Certification/CGEIT-Certified-in-the-Governance-of-Enterprise-IT/Prepare-for-the-Exam/Study-Materials/Documents/Developing-a-Successful-Governance-Strategy.pdf
PCI DSS. (2005). PCI DSS Risk Assessment Guidelines. Retrieved from https://www.pcisecuritystandards.org/
Peltier, T. R. (2005). Information Security Risk Analysis (2nd ed.). Auerbach Publications.
Pfleeger, C. P., & Pfleeger, S. L. (2015). Analyzing computer security: A threat/vulnerability/countermeasure approach (5th ed.). Pearson Education.
Reynolds, G. W. (2012). Ethics in information technology. Boston, MA: Cengage Learning.
Skoudis, E., & Liston, T. (2005). Counter hack reloaded: A step-by-step guide to computer attacks and effective defenses (2nd ed.). Prentice Hall.
Stallings, W., & Brown, L. (2018). Computer security: Principles and practice (4th ed.). Pearson.
Stewart, J. (2012). CISSP Certified Information Systems Security Professional Study Guide Sixth Edition. Canada: John Wiley & Sons, Inc. pp. 255β257. ISBN 978-1-118-31417-3.
Venter, H. S., & Eloff, J. H. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299-307.
Last updated