en:iot-reloaded:cybersecurity_concepts
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:cybersecurity_concepts [2024/10/06 15:25] – [Some commonly used cybersecurity terms] gkuaban | en:iot-reloaded:cybersecurity_concepts [2025/05/13 18:01] (current) – [What is cybersecurity] pczekalski | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Cybersecurity | + | ====== Cybersecurity |
| - | IoT designers and engineers need to have a good understanding of cybersecurity concepts. This will help them understand the various | + | IoT designers and engineers need to understand |
| ===== What is cybersecurity ===== | ===== What is cybersecurity ===== | ||
| - | Cybersecurity refers to the technologies, | + | Cybersecurity refers to the technologies, |
| - | After understanding | + | After understanding cybersecurity, |
| - | The question is why should we be worried about cybersecurity attacks, especially in the context of IoT. The widespread adoption of IoT to improve business processes and personal well-being has created an exponential increase in the options available to cybercriminals to conduct cybersecurity attacks, increasing cybersecurity-related risks for businesses and individuals. This underscores the need for IoT engineers, IT engineers, and other non-IT employees to understand cybersecurity concepts. | + | The question is: Why should we be worried about cybersecurity attacks, especially in the context of IoT? The widespread adoption of IoT to improve business processes and personal well-being has exponentially increased |
| - | ===== Some commonly used cybersecurity terms ===== | + | ===== The confidentiality, |
| - | In order to understand advanced | + | The CIA triad is a conceptual framework that combines three cybersecurity concepts, confidentiality, |
| - | **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | + | <figure IoTcybersec1> |
| - | + | {{ :en:iot-reloaded: | |
| - | **Threats**: It is an action performed with the intention of violating any of the cybersecurity requirements that may result in data theft, leakage, damage, corruption, or losses. The action performed may either disclose the data to unauthorised individuals or alter the data illegally. It may equally result in the disruption of services due to system downtime, system unavailability, | + | < |
| - | + | </figure> | |
| - | ** Cybersecurity vulnerability**: It is a weakness, flaw, or error found in an information system or a cybersecurity | + | |
| - | + | ||
| - | **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks in order to compromise the confidentiality, | + | |
| - | + | ||
| - | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, | + | |
| - | * Phishing attacks | + | |
| - | * Email attachments, | + | |
| - | * Credential theft using various social engineering techniques, | + | |
| - | * Account takeover to steal or damage data and other resources and to conduct further attacks | + | |
| - | * Cryptanalysis of encrypted data, | + | |
| - | * Man-in-the-middle attacks, | + | |
| - | * Cross-site scripting, | + | |
| - | * SQL injection, | + | |
| - | * Insider threats, | + | |
| - | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems), | + | |
| - | * Browser-based attacks, application compromise, | + | |
| - | * Brute-force attacks to compromise passwords, | + | |
| - | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or the information systems, | + | |
| - | * Exploiting the presence of open ports. | + | |
| - | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, | + | |
| - | * Encryption of data during transportation, | + | |
| - | * Designing effective security policies and training and compelling employees and stakeholders to apply them. | + | |
| - | * Patching security vulnerabilities by regularly updating the software and hardware and checking the various system configurations to identify any vulnerabilities. | + | |
| - | * Implementing secure network access mechanisms. | + | |
| - | * Performing regular security audits in order to identify and eliminate threats and vulnerabilities before cybercriminals exploit them. | + | |
| - | * Deploying threats (intrusion) detection and prevention systems. | + | |
| - | + | ||
| - | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise the confidentiality, | + | |
| - | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within the infrastructure of an organisation. These include applications, | + | |
| - | * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware that contains user data and login credentials, | + | |
| - | An effective attack surface management provides the following advantages to organisations and individuals: | + | |
| - | * Identify vulnerabilities and eliminate them. | + | |
| - | * To mitigate the risk posed by cybersecurity threats. | + | |
| - | * Identify new attack surfaces that have been created as they expand their infrastructure and adopt new services. | + | |
| - | * Effective management of access to critical sources and data, minimising the chances of any form of a security breach. | + | |
| - | * Minimise the possibility of successful cybersecurity attacks. | + | |
| - | As IT infrastructures increase in size and are connected to external IT systems over the internet, they become more complex, hard to secure, and frequently targeted by cybercriminals. Some of the ways to minimise attack surfaces in order to reduce the risk of cyberattacks include: | + | |
| - | * The implementation of zero-trust policies to ensure that only authorised users and applications can have access to information resources (computing devices, sensor devices, networks, servers, databases, etc.). This eliminates or reduces the chances of unauthorised access that compromises | + | |
| - | * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that can be exploited by cybercriminals. | + | |
| - | * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that could be exploited by cybercriminals and resolve them to reduce the attack surfaces that cybercriminals can exploit. | + | |
| - | * The network should be segmented into smaller networks using firewalls and micro-segmentation strategies to add more barriers to restrict the spread of attacks and reduce attack surfaces. | + | |
| - | * Regular training of employees so that they can adopt security best practices and respect security policies designed to enhance the security of data and information systems. | + | |
| - | + | ||
| - | **Encryption**: | + | |
| - | * To ensure the confidentiality of data, preventing unauthorised users from having access to the data and ensuring that the data is kept secret. | + | |
| - | * To ensure the integrity of the data by ensuring that it is not altered, damaged, or corrupted during storage or transportation. | + | |
| - | * To authenticate the users by verifying the origin of the data to ensure that the users are who they say they are. | + | |
| - | * To ensure non-repudiation by ensuring that a sender of data cannot deny that they are the origin of the data. | + | |
| - | * It also enables organisations to comply with the security requirements of regulators that require that sensitive data should be adequately protected from theft, corruption and illegal alteration. | + | |
| - | + | ||
| - | Cryptographic algorithms can be categorised into two main types as follows: | + | |
| - | * **Symmetric encryption**: | + | |
| - | * **Asymmetric encryption**: | + | |
| - | Although encryption is very valuable for securing data during transportation, | + | |
| - | * Cybercriminals can use it to hijack the data of individuals and organisations, | + | |
| - | * Effective management of encryption keys to ensure that they cannot be compromised is challenging, | + | |
| - | * There is a growing anxiety that when quantum computing technologies become mature, they will be able to break advanced encryption schemes that we now depend on for the protection of our data. | + | |
| - | + | ||
| - | **Authentication**: | + | |
| - | + | ||
| - | **Authorisation**: | + | |
| - | + | ||
| - | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also be the control of physical access to critical resources of an organisation. It ensures that the confidentiality and integrity of data and information systems are not compromised. Thus, physical access controls physical access to critical resources, while logical access control controls access to information systems (networks, computing nodes, servers, files, and databases). Access to locations where critical assets (servers, network equipment, files) are stored is restricted using electronic access control systems that use keys, access card readers, personal identification number (PIN) pads, auditing and reports to track employee access to these locations. Access to information systems (networks, computing nodes, servers, files, and databases) is restricted using authentication and authorization mechanisms that evaluate the required user login credentials, | + | |
| - | + | ||
| - | **Nonrepudiation**: | + | |
| - | + | ||
| - | **Accountability**: | + | |
| - | + | ||
| - | ===== The confidentiality, | + | |
| - | The CIA triad is a conceptual framework that combines three cybersecurity concepts, confidentiality, | + | |
| **Confidentiality** | **Confidentiality** | ||
| - | It involves the technologies and strategies | + | It involves the technologies and strategies to ensure that sensitive data is kept private and inaccessible |
| * Who should be able to view the data or have access to the data? | * Who should be able to view the data or have access to the data? | ||
| * Are there laws, regulations, | * Are there laws, regulations, | ||
| - | * Are there certain | + | * Are there specific |
| - | * How sensitive is the data, and what are the consequences | + | * How sensitive is the data, and what consequences may be faced if unauthorised individuals access the data? |
| - | * How useful | + | * How valuable |
| - | In order to ensure the confidentiality of the data stored in computer systems and transported through computer and telecommunication networks, some security guidelines should be followed: | + | To ensure the confidentiality of the data stored in computer systems and transported through computer and telecommunication networks, some security guidelines should be followed: |
| - | * Encrypt sensitive data during storage in computer systems and transportation through computer and telecommunication networks. | + | * Encrypt sensitive data during storage in computer systems and transportation through computer and telecommunication networks. |
| - | * Proper | + | * Proper data access |
| - | * The physical location of hardware systems and paper documents should be properly | + | * The physical location of hardware systems and paper documents should be secured |
| - | * Any data, hardware devices, and paper documents | + | * Any data, hardware devices, and paper documents no longer needed should be securely disposed of immediately. |
| - | * When collecting data, care must be taken to ensure | + | * Care must be taken to ensure |
| - | * Sensitive data should be used only when necessary; otherwise, it should not be used at all to preserve its confidentiality. | + | * Sensitive data should be used only when necessary; otherwise, it should not be used to preserve its confidentiality. |
| - | * Appropriate security systems should be implemented to ensure | + | * Appropriate security systems should be implemented to ensure |
| **Integrity** | **Integrity** | ||
| - | Integrity in cybersecurity involves technologies and strategies designed to ensure that data is not modified or deleted during storage or transportation by unauthorised persons. It is very important | + | Integrity in cybersecurity involves technologies and strategies designed to ensure that data is not modified or deleted during storage or transportation by unauthorised persons. It is essential |
| - | * The data must be maintained in its full form with no data elements filtered, truncated or lost to ensure that the data is complete. | + | * To ensure it is complete, the data must be maintained in full form with no data elements filtered, truncated or lost. |
| * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | ||
| - | * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how or how often it's accessed and no matter how long it's stored. | + | * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how often it's accessed and no matter how long it's stored. |
| - | * The safety | + | * Data safety should be ensured by guaranteeing |
| - | The IoT system designers, manufacturers, | + | The IoT system designers, manufacturers, |
| * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | ||
| * Hardware failures and faults. | * Hardware failures and faults. | ||
| - | * Design failures and negligence | + | * Design failures and negligence. |
| - | * Natural failures | + | * Natural failures may result from the deterioration of the hardware device (e.g., corrosion). |
| - | * Power failures outages | + | * Power failures |
| - | * Natural disasters | + | * Natural disasters. |
| * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | ||
| - | * Cyberattacks | + | * Cyberattacks designed to cause hardware or power failures (e.g., energy depletion attacks). |
| The physical integrity of data could be enforced by: | The physical integrity of data could be enforced by: | ||
| * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | ||
| * Implementing battery-protected write cache. | * Implementing battery-protected write cache. | ||
| - | * Deploying storage systems with advanced error-correcting memory devices, | + | * Deploying storage systems with advanced error-correcting memory devices. |
| * Implementing clustered and distributed file systems. | * Implementing clustered and distributed file systems. | ||
| * Implementing error-detection algorithms to detect any changes in the data during transportation. | * Implementing error-detection algorithms to detect any changes in the data during transportation. | ||
| * Deploying backups that are located in different physical locations. | * Deploying backups that are located in different physical locations. | ||
| - | * Implement network protection mechanisms to ensure | + | * Implement network protection mechanisms to ensure the data is not corrupted or lost during transportation. |
| - | IoT system designers, manufacturers, | + | IoT system designers, manufacturers, |
| - | * Logical integrity: Even when there are no hardware issues, there can still be unintended or malicious alterations in the data or data losses during transportation, | + | * Logical integrity: Even with no hardware issues, there can still be unintended or malicious alterations in the data or data losses during transportation, |
| * Data may be deleted, wrongly entered, and illegally altered in the storage system. | * Data may be deleted, wrongly entered, and illegally altered in the storage system. | ||
| * Data may be damaged, lost, or illegally altered during transportation. | * Data may be damaged, lost, or illegally altered during transportation. | ||
| * Data may be stolen, damaged, or illegally altered by a malicious hacker after a successful cyberattack. | * Data may be stolen, damaged, or illegally altered by a malicious hacker after a successful cyberattack. | ||
| - | * Data may be stolen, damaged, lost, or illegally altered | + | * Poor network and infrastructure configuration |
| - | Enforcing data integrity is a complex task that requires | + | Enforcing data integrity is a complex task that requires |
| - | * There should be strict control of access | + | * Access |
| - | * Logs on the actions | + | * Logs of users' |
| * Data should be encrypted during transportation and storage to ensure that it is not altered or damaged during transportation or storage. | * Data should be encrypted during transportation and storage to ensure that it is not altered or damaged during transportation or storage. | ||
| - | * Data protection mechanisms should be used to prevent data losses, e.g., data should be backed up regularly, and error detection and correction communication algorithms should be used. | + | * Data protection mechanisms should be used to prevent data losses. |
| - | * When accessing data to process or analyse it, necessary steps should be taken to ensure that it is not corrupted, lost, or damaged, | + | * When accessing data to process or analyse it, necessary steps should be taken to ensure that it is not corrupted, lost, or damaged, |
| - | * The employees and other stakeholders should be trained to handle the data in such a way that its integrity is not lost, altered, or damaged. | + | * The employees and other stakeholders should be trained to handle the data so that its integrity is not lost, altered, or damaged. |
| **Availability** | **Availability** | ||
| - | The computing, communication, | + | The computing, communication, |
| * Hardware failures that may result from natural failures resulting from deterioration. | * Hardware failures that may result from natural failures resulting from deterioration. | ||
| - | * Software failures that may result from software design flaws or bugs | + | * Software failures that may result from software design flaws or bugs. |
| * Cyberattacks, | * Cyberattacks, | ||
| - | * Power failure | + | * Power failure may result from power outages or depletion of energy stored in the battery in the case of IoT nodes. |
| - | * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from having access to the data when needed. | + | * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from accessing |
| - | * Bandwidth bottlenecks and link failures in the communication network that interfere with the transfer | + | * Bandwidth bottlenecks and link failures in the communication network that interfere with data transfer to users and applications that need them. |
| - | * The downtimes could result from failure, misbehaviour, | + | * The downtimes could result from failure, misbehaviour, |
| * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | ||
| Some of the ways to ensure the availability of information systems and data include the following: | Some of the ways to ensure the availability of information systems and data include the following: | ||
| Line 158: | Line 88: | ||
| * Ensuring effective operation and maintenance processes. | * Ensuring effective operation and maintenance processes. | ||
| * Ensuring effective and efficient energy sources and energy storage systems. | * Ensuring effective and efficient energy sources and energy storage systems. | ||
| - | * The energy | + | * Energy |
| - | * Software design flaws and bugs should be resolved immediately and as quickly | + | * Software design flaws and bugs should be resolved immediately and quickly to minimise downtimes. |
| * The physical storage locations of hardware infrastructure should be carefully secured. | * The physical storage locations of hardware infrastructure should be carefully secured. | ||
| - | * Effective authentication and authorisation mechanisms should | + | * Effective authentication and authorisation mechanisms should ensure that authorised users can access the systems when needed. |
| - | * There should be careful implementation | + | * Cybersecurity systems |
| - | * Ensuring the networking systems are properly | + | * Ensuring the networking systems are correctly |
| - | + | ===== Some commonly used cybersecurity terms ===== | |
| + | To understand advanced cybersecurity concepts and technologies, | ||
| + | **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | ||
| + | **Threats**: | ||
| + | ** Cybersecurity vulnerability**: | ||
| - | + | **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks to compromise the confidentiality, | |
| + | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, | ||
| + | * Phishing attacks. | ||
| + | * Email attachments. | ||
| + | * Credential theft using various social engineering techniques. | ||
| + | * Account takeover to steal or damage data and other resources and to conduct further attacks. | ||
| + | * Cryptoanalysis of encrypted data. | ||
| + | * Man-in-the-middle attacks. | ||
| + | * Cross-site scripting. | ||
| + | * SQL injection. | ||
| + | * Insider threats. | ||
| + | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems). | ||
| + | * Browser-based attacks, application compromise. | ||
| + | * Brute-force attacks to compromise passwords. | ||
| + | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or information systems. | ||
| + | * Exploiting the presence of open ports. | ||
| + | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, | ||
| + | * Encryption of data during transportation, | ||
| + | * Designing effective security policies and training and compelling employees and stakeholders to apply them. | ||
| + | * Patching security vulnerabilities by regularly updating the software and hardware and checking the various system configurations to identify any vulnerabilities. | ||
| + | * Implementing secure network access mechanisms. | ||
| + | * Performing regular security audits to identify and eliminate threats and vulnerabilities before cybercriminals exploit them. | ||
| + | * Deploying threats (intrusion) detection and prevention systems. | ||
| + | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise data and information systems' | ||
| + | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within an organisation' | ||
| + | * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware containing user data and login credentials, | ||
| + | A practical attack surface management provides the following advantages to organisations and individuals: | ||
| + | * Identify vulnerabilities and eliminate them. | ||
| + | * To mitigate the risk posed by cybersecurity threats. | ||
| + | * Identify new attack surfaces created as they expand their infrastructure and adopt new services. | ||
| + | * Effective management of access to critical resources and data minimises the chances of any security breach. | ||
| + | * Minimise the possibility of successful cybersecurity attacks. | ||
| + | As IT infrastructures increase and are connected to external IT systems over the internet, they become more complex, hard to secure, and frequently targeted by cybercriminals. Some of the ways to minimise attack surfaces to reduce the risk of cyberattacks include: | ||
| + | * Implementing zero-trust policies ensures that only authorised users and applications can access information resources (computing devices, sensor devices, networks, servers, databases, etc.). This eliminates or reduces the chances of unauthorised access. | ||
| + | * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that cybercriminals can exploit. | ||
| + | * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that cybercriminals could exploit and resolve to reduce the attack surface that cybercriminals can exploit. | ||
| + | * The network should be segmented into smaller networks using firewalls and micro-segmentation strategies to add more barriers, restrict the spread of attacks, and reduce attack surfaces. | ||
| + | * Regular training of employees so that they can adopt security best practices and respect security policies designed to enhance the security of data and information systems. | ||
| + | **Encryption**: | ||
| + | * To ensure the confidentiality of data, preventing unauthorised users from having access to the data and ensuring that the data is kept secret. | ||
| + | * To ensure the integrity of the data by ensuring that it is not altered, damaged, or corrupted during storage or transportation. | ||
| + | * To authenticate the users by verifying the origin of the data to ensure that the users are who they say they are. | ||
| + | * To ensure non-repudiation by ensuring that a data sender cannot deny that they are the origin of the data. | ||
| + | * It also enables organisations to comply with regulators' | ||
| + | Cryptographic algorithms can be categorised into two main types as follows: | ||
| + | * **Symmetric encryption**: | ||
| + | * **Asymmetric encryption**: | ||
| + | Although encryption is very valuable for securing data during transportation, | ||
| + | * Cybercriminals can use it to hijack the data of individuals and organisations, | ||
| + | * Effective management of encryption keys to ensure that they cannot be compromised is challenging, | ||
| + | * There is a growing anxiety that when quantum computing technologies mature, they will be able to break advanced encryption schemes that we now depend on to protect our data. | ||
| + | **Authentication**: | ||
| + | **Authorisation**: | ||
| + | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also control an organisation' | ||
| + | **Non-repudiation**: | ||
| - | + | **Accountability**: | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
en/iot-reloaded/cybersecurity_concepts.1728217518.txt.gz · Last modified: by gkuaban
