en:iot-reloaded:cybersecurity_concepts
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:cybersecurity_concepts [2024/10/06 15:30] – gkuaban | en:iot-reloaded:cybersecurity_concepts [2025/05/13 18:01] (current) – [What is cybersecurity] pczekalski | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Cybersecurity | + | ====== Cybersecurity |
| - | IoT designers and engineers need to have a good understanding of cybersecurity concepts. This will help them understand the various | + | IoT designers and engineers need to understand |
| ===== What is cybersecurity ===== | ===== What is cybersecurity ===== | ||
| - | Cybersecurity refers to the technologies, | + | Cybersecurity refers to the technologies, |
| - | After understanding | + | After understanding cybersecurity, |
| - | The question is why should we be worried about cybersecurity attacks, especially in the context of IoT. The widespread adoption of IoT to improve business processes and personal well-being has created an exponential increase in the options available to cybercriminals to conduct cybersecurity attacks, increasing cybersecurity-related risks for businesses and individuals. This underscores the need for IoT engineers, IT engineers, and other non-IT employees to understand cybersecurity concepts. | + | The question is: Why should we be worried about cybersecurity attacks, especially in the context of IoT? The widespread adoption of IoT to improve business processes and personal well-being has exponentially increased |
| ===== The confidentiality, | ===== The confidentiality, | ||
| - | The CIA triad is a conceptual framework that combines three cybersecurity concepts, confidentiality, | + | The CIA triad is a conceptual framework that combines three cybersecurity concepts, confidentiality, |
| + | |||
| + | <figure IoTcybersec1> | ||
| + | {{ : | ||
| + | < | ||
| + | </ | ||
| **Confidentiality** | **Confidentiality** | ||
| - | It involves the technologies and strategies | + | It involves the technologies and strategies to ensure that sensitive data is kept private and inaccessible |
| * Who should be able to view the data or have access to the data? | * Who should be able to view the data or have access to the data? | ||
| * Are there laws, regulations, | * Are there laws, regulations, | ||
| - | * Are there certain | + | * Are there specific |
| - | * How sensitive is the data, and what are the consequences | + | * How sensitive is the data, and what consequences may be faced if unauthorised individuals access the data? |
| - | * How useful | + | * How valuable |
| - | In order to ensure the confidentiality of the data stored in computer systems and transported through computer and telecommunication networks, some security guidelines should be followed: | + | To ensure the confidentiality of the data stored in computer systems and transported through computer and telecommunication networks, some security guidelines should be followed: |
| - | * Encrypt sensitive data during storage in computer systems and transportation through computer and telecommunication networks. | + | * Encrypt sensitive data during storage in computer systems and transportation through computer and telecommunication networks. |
| - | * Proper | + | * Proper data access |
| - | * The physical location of hardware systems and paper documents should be properly | + | * The physical location of hardware systems and paper documents should be secured |
| - | * Any data, hardware devices, and paper documents | + | * Any data, hardware devices, and paper documents no longer needed should be securely disposed of immediately. |
| - | * When collecting data, care must be taken to ensure | + | * Care must be taken to ensure |
| - | * Sensitive data should be used only when necessary; otherwise, it should not be used at all to preserve its confidentiality. | + | * Sensitive data should be used only when necessary; otherwise, it should not be used to preserve its confidentiality. |
| - | * Appropriate security systems should be implemented to ensure | + | * Appropriate security systems should be implemented to ensure |
| **Integrity** | **Integrity** | ||
| - | Integrity in cybersecurity involves technologies and strategies designed to ensure that data is not modified or deleted during storage or transportation by unauthorised persons. It is very important | + | Integrity in cybersecurity involves technologies and strategies designed to ensure that data is not modified or deleted during storage or transportation by unauthorised persons. It is essential |
| - | * The data must be maintained in its full form with no data elements filtered, truncated or lost to ensure that the data is complete. | + | * To ensure it is complete, the data must be maintained in full form with no data elements filtered, truncated or lost. |
| * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | ||
| - | * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how or how often it's accessed and no matter how long it's stored. | + | * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how often it's accessed and no matter how long it's stored. |
| - | * The safety | + | * Data safety should be ensured by guaranteeing |
| - | The IoT system designers, manufacturers, | + | The IoT system designers, manufacturers, |
| * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | ||
| * Hardware failures and faults. | * Hardware failures and faults. | ||
| - | * Design failures and negligence | + | * Design failures and negligence. |
| - | * Natural failures | + | * Natural failures may result from the deterioration of the hardware device (e.g., corrosion). |
| - | * Power failures outages | + | * Power failures |
| - | * Natural disasters | + | * Natural disasters. |
| * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | ||
| - | * Cyberattacks | + | * Cyberattacks designed to cause hardware or power failures (e.g., energy depletion attacks). |
| The physical integrity of data could be enforced by: | The physical integrity of data could be enforced by: | ||
| * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | ||
| * Implementing battery-protected write cache. | * Implementing battery-protected write cache. | ||
| - | * Deploying storage systems with advanced error-correcting memory devices, | + | * Deploying storage systems with advanced error-correcting memory devices. |
| * Implementing clustered and distributed file systems. | * Implementing clustered and distributed file systems. | ||
| * Implementing error-detection algorithms to detect any changes in the data during transportation. | * Implementing error-detection algorithms to detect any changes in the data during transportation. | ||
| * Deploying backups that are located in different physical locations. | * Deploying backups that are located in different physical locations. | ||
| - | * Implement network protection mechanisms to ensure | + | * Implement network protection mechanisms to ensure the data is not corrupted or lost during transportation. |
| - | IoT system designers, manufacturers, | + | IoT system designers, manufacturers, |
| - | * Logical integrity: Even when there are no hardware issues, there can still be unintended or malicious alterations in the data or data losses during transportation, | + | * Logical integrity: Even with no hardware issues, there can still be unintended or malicious alterations in the data or data losses during transportation, |
| * Data may be deleted, wrongly entered, and illegally altered in the storage system. | * Data may be deleted, wrongly entered, and illegally altered in the storage system. | ||
| * Data may be damaged, lost, or illegally altered during transportation. | * Data may be damaged, lost, or illegally altered during transportation. | ||
| * Data may be stolen, damaged, or illegally altered by a malicious hacker after a successful cyberattack. | * Data may be stolen, damaged, or illegally altered by a malicious hacker after a successful cyberattack. | ||
| - | * Data may be stolen, damaged, lost, or illegally altered | + | * Poor network and infrastructure configuration |
| - | Enforcing data integrity is a complex task that requires | + | Enforcing data integrity is a complex task that requires |
| - | * There should be strict control of access | + | * Access |
| - | * Logs on the actions | + | * Logs of users' |
| * Data should be encrypted during transportation and storage to ensure that it is not altered or damaged during transportation or storage. | * Data should be encrypted during transportation and storage to ensure that it is not altered or damaged during transportation or storage. | ||
| - | * Data protection mechanisms should be used to prevent data losses, e.g., data should be backed up regularly, and error detection and correction communication algorithms should be used. | + | * Data protection mechanisms should be used to prevent data losses. |
| - | * When accessing data to process or analyse it, necessary steps should be taken to ensure that it is not corrupted, lost, or damaged, | + | * When accessing data to process or analyse it, necessary steps should be taken to ensure that it is not corrupted, lost, or damaged, |
| - | * The employees and other stakeholders should be trained to handle the data in such a way that its integrity is not lost, altered, or damaged. | + | * The employees and other stakeholders should be trained to handle the data so that its integrity is not lost, altered, or damaged. |
| **Availability** | **Availability** | ||
| - | The computing, communication, | + | The computing, communication, |
| * Hardware failures that may result from natural failures resulting from deterioration. | * Hardware failures that may result from natural failures resulting from deterioration. | ||
| - | * Software failures that may result from software design flaws or bugs | + | * Software failures that may result from software design flaws or bugs. |
| * Cyberattacks, | * Cyberattacks, | ||
| - | * Power failure | + | * Power failure may result from power outages or depletion of energy stored in the battery in the case of IoT nodes. |
| - | * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from having access to the data when needed. | + | * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from accessing |
| - | * Bandwidth bottlenecks and link failures in the communication network that interfere with the transfer | + | * Bandwidth bottlenecks and link failures in the communication network that interfere with data transfer to users and applications that need them. |
| - | * The downtimes could result from failure, misbehaviour, | + | * The downtimes could result from failure, misbehaviour, |
| * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | ||
| Some of the ways to ensure the availability of information systems and data include the following: | Some of the ways to ensure the availability of information systems and data include the following: | ||
| Line 83: | Line 88: | ||
| * Ensuring effective operation and maintenance processes. | * Ensuring effective operation and maintenance processes. | ||
| * Ensuring effective and efficient energy sources and energy storage systems. | * Ensuring effective and efficient energy sources and energy storage systems. | ||
| - | * The energy | + | * Energy |
| - | * Software design flaws and bugs should be resolved immediately and as quickly | + | * Software design flaws and bugs should be resolved immediately and quickly to minimise downtimes. |
| * The physical storage locations of hardware infrastructure should be carefully secured. | * The physical storage locations of hardware infrastructure should be carefully secured. | ||
| - | * Effective authentication and authorisation mechanisms should | + | * Effective authentication and authorisation mechanisms should ensure that authorised users can access the systems when needed. |
| - | * There should be careful implementation | + | * Cybersecurity systems |
| - | * Ensuring the networking systems are properly | + | * Ensuring the networking systems are correctly |
| ===== Some commonly used cybersecurity terms ===== | ===== Some commonly used cybersecurity terms ===== | ||
| - | In order to understand advanced cybersecurity concepts and technologies, | + | To understand advanced cybersecurity concepts and technologies, |
| **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | ||
| - | **Threats**: | + | **Threats**: |
| - | ** Cybersecurity vulnerability**: | + | ** Cybersecurity vulnerability**: |
| - | **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks | + | **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks to compromise the confidentiality, |
| - | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, | + | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, |
| - | * Phishing attacks | + | * Phishing attacks. |
| - | * Email attachments, | + | * Email attachments. |
| - | * Credential theft using various social engineering techniques, | + | * Credential theft using various social engineering techniques. |
| - | * Account takeover to steal or damage data and other resources and to conduct further attacks | + | * Account takeover to steal or damage data and other resources and to conduct further attacks. |
| - | * Cryptanalysis | + | * Cryptoanalysis |
| - | * Man-in-the-middle attacks, | + | * Man-in-the-middle attacks. |
| - | * Cross-site scripting, | + | * Cross-site scripting. |
| - | * SQL injection, | + | * SQL injection. |
| - | * Insider threats, | + | * Insider threats. |
| - | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems), | + | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems). |
| - | * Browser-based attacks, application compromise, | + | * Browser-based attacks, application compromise. |
| - | * Brute-force attacks to compromise passwords, | + | * Brute-force attacks to compromise passwords. |
| - | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or the information systems, | + | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or information systems. |
| * Exploiting the presence of open ports. | * Exploiting the presence of open ports. | ||
| - | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, | + | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, |
| * Encryption of data during transportation, | * Encryption of data during transportation, | ||
| * Designing effective security policies and training and compelling employees and stakeholders to apply them. | * Designing effective security policies and training and compelling employees and stakeholders to apply them. | ||
| * Patching security vulnerabilities by regularly updating the software and hardware and checking the various system configurations to identify any vulnerabilities. | * Patching security vulnerabilities by regularly updating the software and hardware and checking the various system configurations to identify any vulnerabilities. | ||
| * Implementing secure network access mechanisms. | * Implementing secure network access mechanisms. | ||
| - | * Performing regular security audits | + | * Performing regular security audits to identify and eliminate threats and vulnerabilities before cybercriminals exploit them. |
| * Deploying threats (intrusion) detection and prevention systems. | * Deploying threats (intrusion) detection and prevention systems. | ||
| - | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise | + | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise |
| - | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within | + | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within an organisation's infrastructure. These include applications, |
| - | * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware | + | * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware |
| - | An effective | + | A practical |
| * Identify vulnerabilities and eliminate them. | * Identify vulnerabilities and eliminate them. | ||
| * To mitigate the risk posed by cybersecurity threats. | * To mitigate the risk posed by cybersecurity threats. | ||
| - | * Identify new attack surfaces | + | * Identify new attack surfaces created as they expand their infrastructure and adopt new services. |
| - | * Effective management of access to critical | + | * Effective management of access to critical |
| * Minimise the possibility of successful cybersecurity attacks. | * Minimise the possibility of successful cybersecurity attacks. | ||
| - | As IT infrastructures increase | + | As IT infrastructures increase and are connected to external IT systems over the internet, they become more complex, hard to secure, and frequently targeted by cybercriminals. Some of the ways to minimise attack surfaces to reduce the risk of cyberattacks include: |
| - | * The implementation of zero-trust policies | + | * Implementing |
| - | * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that can be exploited by cybercriminals. | + | * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that cybercriminals |
| - | * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that could be exploited by cybercriminals | + | * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that cybercriminals |
| - | * The network should be segmented into smaller networks using firewalls and micro-segmentation strategies to add more barriers | + | * The network should be segmented into smaller networks using firewalls and micro-segmentation strategies to add more barriers, restrict the spread of attacks, and reduce attack surfaces. |
| * Regular training of employees so that they can adopt security best practices and respect security policies designed to enhance the security of data and information systems. | * Regular training of employees so that they can adopt security best practices and respect security policies designed to enhance the security of data and information systems. | ||
| - | **Encryption**: | + | **Encryption**: |
| * To ensure the confidentiality of data, preventing unauthorised users from having access to the data and ensuring that the data is kept secret. | * To ensure the confidentiality of data, preventing unauthorised users from having access to the data and ensuring that the data is kept secret. | ||
| * To ensure the integrity of the data by ensuring that it is not altered, damaged, or corrupted during storage or transportation. | * To ensure the integrity of the data by ensuring that it is not altered, damaged, or corrupted during storage or transportation. | ||
| * To authenticate the users by verifying the origin of the data to ensure that the users are who they say they are. | * To authenticate the users by verifying the origin of the data to ensure that the users are who they say they are. | ||
| - | * To ensure non-repudiation by ensuring that a sender | + | * To ensure non-repudiation by ensuring that a data sender cannot deny that they are the origin of the data. |
| - | * It also enables organisations to comply with the security requirements | + | * It also enables organisations to comply with regulators' |
| Cryptographic algorithms can be categorised into two main types as follows: | Cryptographic algorithms can be categorised into two main types as follows: | ||
| - | * **Symmetric encryption**: | + | * **Symmetric encryption**: |
| - | * **Asymmetric encryption**: | + | * **Asymmetric encryption**: |
| - | Although encryption is very valuable for securing data during transportation, | + | Although encryption is very valuable for securing data during transportation, |
| * Cybercriminals can use it to hijack the data of individuals and organisations, | * Cybercriminals can use it to hijack the data of individuals and organisations, | ||
| * Effective management of encryption keys to ensure that they cannot be compromised is challenging, | * Effective management of encryption keys to ensure that they cannot be compromised is challenging, | ||
| - | * There is a growing anxiety that when quantum computing technologies | + | * There is a growing anxiety that when quantum computing technologies mature, they will be able to break advanced encryption schemes that we now depend on to protect |
| - | + | ||
| - | **Authentication**: | + | |
| - | + | ||
| - | **Authorisation**: | + | |
| - | + | ||
| - | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also be the control of physical access to critical resources of an organisation. It ensures that the confidentiality and integrity of data and information systems are not compromised. Thus, physical access controls physical access to critical resources, while logical access control controls access to information systems (networks, computing nodes, servers, files, and databases). Access to locations where critical assets (servers, network equipment, files) are stored is restricted using electronic access control systems that use keys, access card readers, personal identification number (PIN) pads, auditing and reports to track employee access to these locations. Access to information systems (networks, computing nodes, servers, files, and databases) is restricted using authentication and authorization mechanisms that evaluate the required user login credentials, | + | |
| - | + | ||
| - | **Nonrepudiation**: | + | |
| - | + | ||
| - | **Accountability**: | + | |
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| + | **Authentication**: | ||
| + | **Authorisation**: | ||
| + | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also control an organisation' | ||
| + | **Non-repudiation**: | ||
| + | **Accountability**: | ||
en/iot-reloaded/cybersecurity_concepts.1728217821.txt.gz · Last modified: by gkuaban
