
Cybersecurity Insights and Examples
Explore the world of cybersecurity with insights on threat matrices, first principles, security needs, threats, assets, and practical examples like Mom & Pop Shop. Understand the importance of confidentiality, integrity, and availability in securing assets against potential threats.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Cybersecurity: Threat Matrix Janica Edmonds
Cybersecurity First Principles Domain separation Process Isolation Resource encapsulation Layering Modularization Least Privilege Information hiding Abstraction Simplicity Minimization 2
Cyber Realm Card game Created by GenCyber Duo at California State University, San Bernardino Played in pairs 3
Security Needs Confidentiality Integrity Availability 4
Security Threats A potential occurrence, malicious or otherwise, that might damage or compromise assets. Interception asset is diverted. Interruption asset is delayed Modification asset is altered. Fabrication asset is manufactured. 5
Security Assets Components of the system or network. Hardware Software People Data 6
Example: Mom & Pop Shop Mom & Pop Shop Running a touristy type business selling handmade crafts Keep accounts and business transactions records on a computer Running a website to advertise their business Security What are the assets? How does CIA apply? What are ways that CIA could be threatened? 7
Threat Matrix Threat/Asset HW SW People Data Interception Interruption Modification Fabrication 8
Example: Threat Matrix Mom & Pop Shop Threat/Asset HW SW People Data Interception Interruption Modification Fabrication 9
Example: Principles Applied Domain separation Layering Least privilege Information hiding Simplicity Minimization Modularization 10