Computer Science Cybersecurity Cybersecurity and Information Security
Cybersecurity and Information Security
As a critical discipline within computer science, Cybersecurity and Information Security encompasses the principles, technologies, and practices designed to protect computer systems, networks, programs, and data from attack, damage, or unauthorized access. It is fundamentally concerned with preserving the confidentiality, integrity, and availability of information assets through a multi-layered approach that combines technical controls like firewalls and encryption with formal policies, risk management, and user education. This comprehensive field addresses the constantly evolving landscape of digital threats to ensure the resilience and trustworthiness of digital infrastructure.
1.1.
Core Security Principles
1.1.1.
The CIA Triad
1.1.1.1.1. Data Classification Systems
1.1.1.1.2. Access Control Mechanisms
1.1.1.1.3. Encryption for Data Protection
1.1.1.1.4. Information Disclosure Prevention
1.1.1.2.1. Data Validation Techniques
1.1.1.2.2. Hash Functions and Checksums
1.1.1.2.3. Digital Signatures
1.1.1.2.4. Change Control Processes
1.1.1.2.5. Version Control Systems
1.1.1.3.1. System Redundancy
1.1.1.3.2. Fault Tolerance Design
1.1.1.3.3. Backup Strategies
1.1.1.3.4. Recovery Planning
1.1.1.3.5. Service Level Agreements
1.1.2.
Extended Security Models
1.1.2.1. The Parkerian Hexad
1.1.2.1.1. Possession or Control
1.1.2.2.1. Digital Signatures
1.1.2.2.3. Legal Evidence Requirements
1.1.3.
Formal Security Models
1.1.3.1. Bell-LaPadula Model
1.1.3.1.1. Simple Security Property
1.1.3.1.3. Security Levels
1.1.3.2. Biba Integrity Model
1.1.3.2.1. Simple Integrity Property
1.1.3.2.2. Star Integrity Property
1.1.3.2.3. Integrity Levels
1.1.3.3. Clark-Wilson Model
1.1.3.3.1. Well-formed Transactions
1.1.3.3.2. Separation of Duties
1.1.3.3.3. Constrained Data Items
1.2.
Security Terminology and Concepts
1.2.1.
Fundamental Terms
1.2.1.1.1. Asset Identification
1.2.1.1.2. Asset Classification
1.2.1.1.3. Asset Valuation
1.2.1.2.4. Threat Modeling
1.2.1.3.1. Technical Vulnerabilities
1.2.1.3.2. Administrative Vulnerabilities
1.2.1.3.3. Physical Vulnerabilities
1.2.1.4.1. Exploit Development
1.2.1.4.3. Zero-Day Exploits
1.2.1.5.1. Risk Assessment
1.2.1.5.2. Risk Calculation
1.2.2.
Security Controls
1.2.2.1. Control Categories
1.2.2.1.1. Preventive Controls
1.2.2.1.2. Detective Controls
1.2.2.1.3. Corrective Controls
1.2.2.1.4. Deterrent Controls
1.2.2.1.5. Recovery Controls
1.2.2.1.6. Compensating Controls
1.2.2.2.1. Administrative Controls
1.2.2.2.2. Technical Controls
1.2.2.2.3. Physical Controls
1.2.3.
Attack Concepts
1.2.3.1.1. Network-based Vectors
1.2.3.1.2. Physical Vectors
1.2.3.1.3. Social Engineering Vectors
1.2.3.1.4. Supply Chain Vectors
1.2.3.2.1. Surface Analysis
1.2.3.2.2. Surface Reduction
1.2.3.2.3. Attack Surface Management
1.3.
The Threat Landscape
1.3.1.
Threat Actor Categories
1.3.1.1. Nation-State Actors
1.3.1.1.1. Advanced Persistent Threats
1.3.1.1.2. Cyber Warfare Capabilities
1.3.1.1.3. Espionage Operations
1.3.1.2.1. Financially Motivated Groups
1.3.1.2.2. Organized Crime Syndicates
1.3.1.2.3. Ransomware Operators
1.3.1.3.1. Ideological Motivations
1.3.1.3.2. Protest Tactics
1.3.1.3.3. Information Warfare
1.3.1.4.1. Malicious Insiders
1.3.1.4.2. Negligent Insiders
1.3.1.4.3. Compromised Insiders
1.3.1.5.3. Limited Capabilities
1.3.2.
Attack Classifications
1.3.2.1. Malware Categories
1.3.2.2. Social Engineering Attacks
1.3.2.3.1. Denial of Service
1.3.2.3.2. Distributed Denial of Service
1.3.2.3.3. Man-in-the-Middle
1.3.2.3.4. Session Hijacking
1.3.2.4. Authentication Attacks
1.3.2.4.1. Password Attacks
1.3.2.4.2. Credential Stuffing
1.3.2.4.3. Password Spraying
1.3.2.4.4. Brute Force Attacks
1.3.2.4.5. Dictionary Attacks