C Y BE R S E C U R I T Y
ECURITAT E (SE CURIT Y GOALS)
OBIECTIVE DE S
CYBER SECURITY GOALS
1. CONFIDENTIALITY
• CONFIDENȚIALITATEA EVITĂ DIVULGAREA NEAUTORIZATĂ A INFORMAȚIILOR. ACEASTA IMPLICĂ PROTECȚIA
DATELOR, OFERIND ACCES CELOR CĂRORA LI SE PERMITE SĂ LE VADĂ ÎN TIMP CE LE INTERZICE ALTORA SĂ
ÎNVEȚE CEVA DESPRE CONȚINUTUL SĂU.
• ÎMPIEDICĂ INFORMAȚIILE ESENȚIALE SĂ AJUNGĂ LA PERSOANE GREȘITE, ASIGURÂNDU-SE ÎN ACELAȘI TIMP
CĂ OAMENII POTRIVIȚI LE POT OBȚINE. CRIPTAREA DATELOR ESTE UN BUN EXEMPLU PENTRU A ASIGURA
CONFIDENȚIALITATEA.
CONFIDENTIALITY
ENCRYPTION
• ENCRYPTION IS A METHOD OF TRANSFORMING INFORMATION TO MAKE IT UNREADABLE FOR
UNAUTHORIZED USERS BY USING AN ALGORITHM. THE TRANSFORMATION OF DATA USES A SECRET KEY
(AN ENCRYPTION KEY) SO THAT THE TRANSFORMED DATA CAN ONLY BE READ BY USING ANOTHER SECRET
KEY (DECRYPTION KEY). IT PROTECTS SENSITIVE DATA SUCH AS CREDIT CARD NUMBERS BY ENCODING
AND TRANSFORMING DATA INTO UNREADABLE CIPHER TEXT. THIS ENCRYPTED DATA CAN ONLY BE READ
BY DECRYPTING IT. ASYMMETRIC-KEY AND SYMMETRIC-KEY ARE THE TWO PRIMARY TYPES OF
ENCRYPTION.
ACCESS CONTROL
• ACCESS CONTROL DEFINES RULES AND POLICIES FOR LIMITING ACCESS TO A SYSTEM OR TO PHYSICAL
OR VIRTUAL RESOURCES. IT IS A PROCESS BY WHICH USERS ARE GRANTED ACCESS AND CERTAIN
PRIVILEGES TO SYSTEMS, RESOURCES OR INFORMATION. IN ACCESS CONTROL SYSTEMS, USERS NEED TO
PRESENT CREDENTIALS BEFORE THEY CAN BE GRANTED ACCESS SUCH AS A PERSON'S NAME OR A
COMPUTER'S SERIAL NUMBER. IN PHYSICAL SYSTEMS, THESE CREDENTIALS MAY COME IN MANY FORMS,
BUT CREDENTIALS THAT CAN'T BE TRANSFERRED PROVIDE THE MOST SECURITY.
AUTHENTICATION
• AN AUTHENTICATION IS A PROCESS THAT ENSURES AND CONFIRMS A USER'S IDENTITY OR ROLE THAT SOMEONE
HAS. IT CAN BE DONE IN A NUMBER OF DIFFERENT WAYS, BUT IT IS USUALLY BASED ON A COMBINATION OF:
• SOMETHING THE PERSON HAS (LIKE A SMART CARD OR A RADIO KEY FOR STORING SECRET KEYS),
• SOMETHING THE PERSON KNOWS (LIKE A PASSWORD),
• SOMETHING THE PERSON IS (LIKE A HUMAN WITH A FINGERPRINT).
• AUTHENTICATION IS THE NECESSITY OF EVERY ORGANIZATIONS BECAUSE IT ENABLES ORGANIZATIONS TO KEEP
THEIR NETWORKS SECURE BY PERMITTING ONLY AUTHENTICATED USERS TO ACCESS ITS PROTECTED
RESOURCES. THESE RESOURCES MAY INCLUDE COMPUTER SYSTEMS, NETWORKS, DATABASES, WEBSITES AND
OTHER NETWORK-BASED APPLICATIONS OR SERVICES.
AUTHORIZATION
• AUTHORIZATION IS A SECURITY MECHANISM WHICH GIVES PERMISSION TO DO OR HAVE SOMETHING. IT
IS USED TO DETERMINE A PERSON OR SYSTEM IS ALLOWED ACCESS TO RESOURCES, BASED ON AN
ACCESS CONTROL POLICY, INCLUDING COMPUTER PROGRAMS, FILES, SERVICES, DATA AND APPLICATION
FEATURES. IT IS NORMALLY PRECEDED BY AUTHENTICATION FOR USER IDENTITY VERIFICATION. SYSTEM
ADMINISTRATORS ARE TYPICALLY ASSIGNED PERMISSION LEVELS COVERING ALL SYSTEM AND USER
RESOURCES. DURING AUTHORIZATION, A SYSTEM VERIFIES AN AUTHENTICATED USER'S ACCESS RULES
AND EITHER GRANTS OR REFUSES RESOURCE ACCESS.
2. INTEGRITY
• INTEGRITY REFERS TO THE METHODS FOR ENSURING THAT DATA IS REAL, ACCURATE AND SAFEGUARDED
FROM UNAUTHORIZED USER MODIFICATION. IT IS THE PROPERTY THAT INFORMATION HAS NOT BE
ALTERED IN AN UNAUTHORIZED WAY, AND THAT SOURCE OF THE INFORMATION IS GENUINE.
INTEGRITY
BACKUPS
• BACKUP IS THE PERIODIC ARCHIVING OF DATA. IT IS A PROCESS OF MAKING COPIES OF DATA OR DATA
FILES TO USE IN THE EVENT WHEN THE ORIGINAL DATA OR DATA FILES ARE LOST OR DESTROYED. IT IS
ALSO USED TO MAKE COPIES FOR HISTORICAL PURPOSES, SUCH AS FOR LONGITUDINAL STUDIES,
STATISTICS OR FOR HISTORICAL RECORDS OR TO MEET THE REQUIREMENTS OF A DATA RETENTION
POLICY. MANY APPLICATIONS ESPECIALLY IN A WINDOWS ENVIRONMENT, PRODUCE BACKUP FILES USING
THE .BAK FILE EXTENSION.
CHECKSUMS
• A CHECKSUM IS A NUMERICAL VALUE USED TO VERIFY THE INTEGRITY OF A FILE OR A DATA TRANSFER. IN
OTHER WORDS, IT IS THE COMPUTATION OF A FUNCTION THAT MAPS THE CONTENTS OF A FILE TO A
NUMERICAL VALUE. THEY ARE TYPICALLY USED TO COMPARE TWO SETS OF DATA TO MAKE SURE THAT
THEY ARE THE SAME. A CHECKSUM FUNCTION DEPENDS ON THE ENTIRE CONTENTS OF A FILE. IT IS
DESIGNED IN A WAY THAT EVEN A SMALL CHANGE TO THE INPUT FILE (SUCH AS FLIPPING A SINGLE BIT)
LIKELY TO RESULTS IN DIFFERENT OUTPUT VALUE.
DATA CORRECTING CODES
• IT IS A METHOD FOR STORING DATA IN SUCH A WAY THAT SMALL CHANGES CAN BE EASILY DETECTED AND
AUTOMATICALLY CORRECTED.
3. AVAILABILITY
• AVAILABILITY IS THE PROPERTY IN WHICH INFORMATION IS ACCESSIBLE AND MODIFIABLE IN A TIMELY
FASHION BY THOSE AUTHORIZED TO DO SO. IT IS THE GUARANTEE OF RELIABLE AND CONSTANT ACCESS
TO OUR SENSITIVE DATA BY AUTHORIZED PEOPLE.
TOOLS FOR AVAILABILITY
• PHYSICAL PROTECTIONS
• COMPUTATIONAL REDUNDANCIES
TOOLS FOR AVAILABILITY
PHYSICAL PROTECTIONS
• PHYSICAL SAFEGUARD MEANS TO KEEP INFORMATION AVAILABLE EVEN IN THE EVENT OF PHYSICAL
CHALLENGES. IT ENSURE SENSITIVE INFORMATION AND CRITICAL INFORMATION TECHNOLOGY ARE
HOUSED IN SECURE AREAS.
COMPUTATIONAL REDUNDANCIES
• IT IS APPLIED AS FAULT TOLERANT AGAINST ACCIDENTAL FAULTS. IT PROTECTS COMPUTERS AND
STORAGE DEVICES THAT SERVE AS FALLBACKS IN THE CASE OF FAILURES.