Skip to main content

Security: Basics

Overview​

Cybersecurity, often referred to as information technology security or computer security, is the practice of protecting computer systems, networks, devices, and data from unauthorized access, cyber attacks, damage, or theft. It encompasses a wide range of technologies, processes, and practices designed to safeguard digital assets and ensure the confidentiality, integrity, and availability of information.

In essence, cybersecurity aims to mitigate the risks associated with cyber threats, which can include various forms of malicious activities such as hacking, malware, phishing, ransomware, denial-of-service attacks, and social engineering. These threats can target individuals, organizations, governments, or even entire nations, and they can lead to financial losses, reputational damage, privacy breaches, and disruption of critical services.

Key Components

  • Risk Management: Identifying, assessing, and prioritizing risks to determine the most effective strategies for mitigating them
  • Security Policies and Procedures: Establishing guidelines, standards, and protocols to govern the secure use of technology and the protection of information assets
  • Access Control: Implementing mechanisms to regulate and monitor access to systems, networks, and data, ensuring that only authorized users can perform specific actions
  • Encryption: Using cryptographic techniques to secure data in transit and at rest, preventing unauthorized disclosure or tampering
  • Network Security: Deploying firewalls, intrusion detection systems, and other technologies to detect and prevent unauthorized access and malicious activities on networks
  • Endpoint Security: Securing individual devices (e.g., computers, smartphones, IoT devices) to protect against malware, unauthorized access, and data breaches
  • Incident Response: Developing and implementing procedures to detect, respond to, and recover from security incidents, minimizing their impact on operations and data
  • Security Awareness Training: Educating users about cybersecurity risks, best practices, and policies to promote a security-conscious culture within organizations
  • Compliance and Regulation: Ensuring compliance with relevant laws, regulations, and industry standards related to cybersecurity and data protection
  • Continuous Monitoring and Improvement: Regularly monitoring systems, networks, and processes for security threats and vulnerabilities, and continually improving security measures based on emerging threats and evolving best practices

Cryptography​

Cryptography is the science and practice of securing communication and data by converting it into an unreadable format, known as ciphertext, using mathematical algorithms. It ensures that only authorized parties can access and understand the information. Cryptography plays a crucial role in cybersecurity by protecting sensitive data from unauthorized access, tampering, or theft.

Authentication (AuthN) and Authorization (AuthZ)​

AspectAuthenticationAuthorization
DefinitionThe process of verifying the identity of a user (who are you?)The process of determining what resources a user can access and what actions they can perform (what are you allowed to do?)
PurposeTo ensure that the user is who they claim to beTo control access to resources based on user identity and permissions
ObjectiveVerify the user's identityDetermine if the user is allowed to access the requested resource
FocusIdentity verificationPermission management
GoalTo establish trust between the system and the userTo enforce security policies and restrict access to authorized users
DependencyPrecedes authorizationDepends on authentication
ProcessTypically involves providing credentials such as username/password, biometrics, tokens, etc.Typically occurs after successful authentication, involves verifying user permissions and access rights
ComponentsCredentials, authentication server, user, and verifierPermissions, roles, access control lists (ACLs), policy enforcement points
ExamplesUsername/password, biometric authentication, multi-factor authenticationRole-based access control (RBAC), attribute-based access control (ABAC), access control lists (ACLs)
Common ProtocolsOAuth, OpenID Connect, SAML, LDAP, KerberosOAuth, OpenID Connect, SAML, XACML, ABAC
Failure ImpactAuthentication failure denies access to the systemAuthorization failure allows access but restricts functionality
RisksImpersonation, credential theft, replay attacksUnauthorized access, data breaches, privilege escalation
ImplementationImplemented at the application or network levelImplemented through access control mechanisms within applications or systems
TechniquesSingle-factor authentication, multi-factor authentication, biometric authenticationRole-based access control (RBAC), attribute-based access control (ABAC), discretionary access control (DAC)
GranularityUsually binary (authenticated or not)Can be fine-grained, defining specific permissions for different resources or actions