Foundations - Part 01 - Prof. Saji K Mathew

NPTEL-NOC IITM
7 Aug 202329:37

Summary

TLDRThis cybersecurity and privacy course transcript introduces fundamental aspects of cybersecurity, emphasizing its role as an administrative issue that encompasses managing human, technological, and organizational resources. It discusses the McCumber cube and the CIA triangle (Confidentiality, Integrity, Availability) as core concepts, highlighting the importance of policy, education, and technology in ensuring information security. The script also touches on the human element of cybersecurity, including the need for information classification and the ethical considerations of data access and protection.

Takeaways

  • 😀 Cybersecurity and privacy are foundational topics, with cybersecurity serving as an administrative issue focusing on the governance and management of organizational resources.
  • 🔒 The course emphasizes the importance of frameworks and standards for cybersecurity management, highlighting the three-dimensional perspective of technology as a threat, asset, and protective tool.
  • 📈 Cybersecurity challenges are evolving, and understanding the holistic concept of information security involves considering multiple dimensions, including network security, computer and data security, and management of information security.
  • 📊 The McCumber cube (NSTI SSC security model) provides a comprehensive framework for understanding cybersecurity by considering computing dimensions, security objectives, and methods to ensure security.
  • 🛡️ The CIA triangle is a fundamental concept in cybersecurity, representing the three core objectives: Confidentiality, Integrity, and Availability, which are essential for securing information in the cyber world.
  • 🔐 Confidentiality ensures that information is accessible only to the intended recipients, preventing unauthorized access and maintaining privacy.
  • 🔄 Integrity refers to the completeness and accuracy of data, ensuring that information is transmitted without alteration, damage, or loss.
  • 🚀 Availability ensures that data is accessible when needed by the intended party, emphasizing the importance of system reliability and redundancy to prevent downtime.
  • 🔑 Information classification is crucial for maintaining confidentiality, dictating who can access certain types of data within an organization.
  • 🔗 The concept of data integrity is closely linked to data privacy rights, where individuals should have access to and the ability to update their personal information.
  • 🌐 The script uses the example of the Aadhaar database to illustrate the importance of protecting personal biometric data and maintaining the confidentiality and integrity of such sensitive information.

Q & A

  • What is the main focus of the cybersecurity and privacy course?

    -The main focus of the course is on cybersecurity as an administrative issue, emphasizing governance and management of organizations. It also explores the relationship between cybersecurity and data privacy.

  • How does the course view technology in the context of cybersecurity?

    -The course views technology from three perspectives: as a source of threat, as an asset to be protected, and as a tool for protecting cyber assets.

  • What are the three major dimensions of information security discussed in the course?

    -The three major dimensions of information security are network security, computer and data security, and the management of information security.

  • Why is policy important in cybersecurity management?

    -Policy is important because it guides decisions related to cybersecurity investments and practices. It ensures that security measures align with the organization's goals and the criticality of its cyber assets.

  • What is the CIA triangle in cybersecurity?

    -The CIA triangle refers to the three primary objectives of cybersecurity: Confidentiality, Integrity, and Availability. These objectives ensure that information is protected from unauthorized access, remains intact, and is accessible when needed.

  • What is the McCumber Cube, and how does it relate to cybersecurity?

    -The McCumber Cube is a model that provides a holistic view of cybersecurity. It incorporates three dimensions: the roles of computing systems (storage, processing, transmission), the objectives of cybersecurity (confidentiality, integrity, availability), and the methods to ensure cybersecurity (policy, education, technology).

  • How does the course define confidentiality in the context of cybersecurity?

    -Confidentiality ensures that information is accessed only by authorized recipients. It involves protecting data from unauthorized access and maintaining privacy through information classification and secure storage.

  • What does integrity mean in terms of cybersecurity?

    -Integrity refers to the completeness and accuracy of data. It ensures that information remains unchanged during transmission and is protected from unauthorized alteration or deletion.

  • Why is availability important in cybersecurity?

    -Availability ensures that information and resources are accessible to authorized users when needed. It is critical for maintaining business operations and relies on system reliability and redundancy.

  • How are confidentiality, integrity, and availability interrelated in cybersecurity?

    -Confidentiality, integrity, and availability are interrelated as they collectively ensure the security of information. Confidentiality prevents unauthorized access, integrity maintains data accuracy, and availability ensures access to authorized users.

Outlines

00:00

📘 Introduction to Cybersecurity Fundamentals

The script introduces the second session of a cybersecurity and privacy course, emphasizing the importance of understanding the foundational aspects of cybersecurity. It clarifies that cybersecurity is not merely a technological issue but also a significant administrative concern involving the management and governance of organizational resources. The course aims to explore frameworks and standards for cybersecurity management and considers technology from three perspectives: as a threat, an asset to protect, and a tool for protection. The script also previews the connection between data privacy and cybersecurity to be discussed in later sessions and introduces a holistic diagram to conceptualize information security.

05:00

🔐 The Three Pillars of Information Security

This paragraph delves into the three major dimensions of information security: network security, computer and data security, and the management of information security. It explains the importance of data storage, transmission, and processing, and how security is integral to each of these computing elements. The script discusses the administrative aspect of cybersecurity, highlighting the need for management practices, policies, and decisions on investment in cybersecurity. It also introduces the CIA triangle—Confidentiality, Integrity, and Availability—as the core objectives of cybersecurity, which are essential for secure storage, processing, and transmission of information.

10:04

📊 McCumber Cube for Comprehensive Cybersecurity

The McCumber cube is introduced as a holistic model for understanding cybersecurity, ensuring that no aspect of cybersecurity is overlooked. The cube represents three dimensions: the computing roles of storage, processing, and transmission; the objectives of confidentiality, integrity, and availability; and the methods of policy, education, and technology to ensure cybersecurity. Each cell of the cube is examined to ensure that all dimensions are considered, emphasizing the integrated effort required to protect cyber assets.

15:13

🤫 Confidentiality in Cybersecurity

Confidentiality is explored as a critical concept in cybersecurity, defined as the protection of information to ensure that it is only accessible to the intended recipient. The script uses the example of Rivest, Shamir, and Adleman to illustrate the concept of confidentiality through encryption techniques. It discusses the importance of information classification, database access policies, and training to maintain confidentiality. The paragraph also touches on the societal implications of confidentiality, such as access to personal information like biometric data in Aadhaar databases, and the legal and ethical responsibilities that come with data collection and processing.

20:14

🛡️ Integrity of Data in Cybersecurity

Integrity is defined as the quality of being complete and unaltered, with the script discussing its significance in ensuring that data remains whole and unchanged during transmission. It provides examples of how data integrity can be compromised, such as the alteration of a CV or the incorrect entry of personal information. The importance of data subject's access to their data for updating and the role of regulations in ensuring data integrity are highlighted. The script also emphasizes the role of redundancy in technological systems to ensure the integrity of data.

25:17

🚀 Availability as a Cybersecurity Objective

Availability is presented as the third leg of the CIA triad, focusing on the need for data to be accessible when required by the intended party. The script contrasts availability with confidentiality, explaining that while data should not be accessible to unauthorized individuals, it must be readily available to those with proper access rights. Examples of the importance of availability in business contexts, such as booking airline or train tickets, are given. The concept of system redundancy to ensure continuous availability is introduced, along with the financial implications of achieving higher levels of availability through service level agreements and redundancy investments.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. It is the main theme of the video, which discusses its importance in the context of administrative issues, governance, and management of organizations. The script mentions cybersecurity challenges and the need for frameworks and standards for its management.

💡Privacy

Privacy, in the context of the video, relates to the right of individuals to have control over their personal information and to keep it protected from unauthorized use or disclosure. It is a topic that will be connected to cybersecurity in later sessions, emphasizing the relationship between data privacy and cybersecurity.

💡Information Security

Information security is a subset of cybersecurity that specifically deals with the protection of data, both at rest and in transit. The script describes it as a crucial part of cybersecurity, highlighting its multi-dimensional nature, including network security, computer and data security, and the management of information security.

💡Policy

In the video, policy is presented as a critical intersection in the management of cybersecurity. It guides security-related practices and decisions, such as how much an organization should invest in cybersecurity. Policies differ based on the organization's criticality and assets, and they are essential for making informed choices on cybersecurity investments.

💡CIA Triangle

The CIA Triangle, also known as the three objectives or purposes of cybersecurity, stands for Confidentiality, Integrity, and Availability. The video script explains that these three concepts are fundamental to cybersecurity, aiming to ensure the security of information in the cyber world. They are a dominant concept set that is essential for understanding the purpose of information security.

💡Confidentiality

Confidentiality, as discussed in the script, is about ensuring that information is only accessible to those who are authorized to view it. It is illustrated with the example of an envelope marked 'confidential' and the need for encryption techniques to protect the data being transmitted from one party to another, such as Alice sending a message to Bob while preventing Eve from intercepting it.

💡Integrity

Integrity in the context of cybersecurity means ensuring that data is complete, accurate, and has not been tampered with during transmission. The script uses the example of a CV where the work experience might be altered, emphasizing the need for data to reach its intended recipient without any damage, manipulation, or change.

💡Availability

Availability ensures that data is accessible when needed by the authorized party. The script contrasts it with confidentiality, noting that while data should not be available to those without access rights, it should be readily accessible to those who have a legitimate need for it, such as a user trying to access their own information or make a reservation.

💡McCumber Cube

The McCumber Cube, also known as the NSTI SSC security model, is a framework proposed by John McCumber that provides a holistic view of cybersecurity. The script describes it as a cube with three dimensions: computing, objectives, and methods. Each cell of the cube represents a unique combination of these dimensions, ensuring that all aspects of cybersecurity are considered.

💡Redundancy

Redundancy, in the context of the video, is a technological method used to ensure the availability of systems. It involves having backup systems or processes in place so that if the primary system fails, the secondary can take over. The script mentions redundancy as a way to achieve high availability, especially in critical systems, and relates it to the cost and service level agreements.

Highlights

Introduction to cybersecurity and privacy, emphasizing the importance of understanding the connection between the two.

Cybersecurity is viewed as an administrative issue, involving the management of various resources within an organization.

Frameworks and standards for cybersecurity management are a key part of the course curriculum.

Technology's role in cybersecurity is threefold: as a source of threat, an asset to protect, and a tool for protection.

Information security is a crucial component of cybersecurity, with multiple dimensions to understand.

The McCumber cube provides a holistic approach to understanding cybersecurity, covering computing dimensions, security objectives, and methods.

The CIA triangle (Confidentiality, Integrity, Availability) represents the core objectives of cybersecurity.

Confidentiality ensures that information is only accessible to the intended recipients.

Integrity ensures that data remains complete, unaltered, and accurate throughout transmission.

Availability ensures that data is accessible when needed by the authorized party.

The importance of policy in guiding cybersecurity decisions, such as investment levels in security.

The role of human resources and technology in protecting cyber assets, alongside management decisions.

The concept of information classification to ensure confidentiality through restricted access.

The application of encryption techniques to maintain confidentiality, referencing Rivest, Shamir, and Adleman.

The practical implications of integrity in ensuring personal data accuracy, such as in employment records.

The significance of availability in business contexts, like online ticket booking systems.

Technological methods to ensure availability, such as redundancy and reliability engineering.

Service level agreements and the financial implications of higher availability requirements.

Transcripts

play00:17

Hello and welcome to the second session of cybersecurity and privacy course.

play00:23

So, in the last class we had a brief introduction about cybersecurity and privacy, actually

play00:30

we were trying to understand what the title means.

play00:33

So, it is like laying the foundation for foundation and today is the foundation for cybersecurity.

play00:40

So, we will dwell on certain fundamental aspects of cybersecurity, predominantly cybersecurity

play00:48

and privacy as a topic, we will do after a few sessions on cybersecurity gets over and

play00:55

you will get to appreciate what is, what are the connections between data privacy and cybersecurity

play01:01

through, of course, through several sessions that follow.

play01:06

So, essentially cybersecurity as an administrative issue, is what this course is focusing on.

play01:15

So, in administration you need to administrate, you need to manage several resources.

play01:21

So,you have to as managers , you manage human resources, you manage technological resources

play01:29

you manage tangible and intangible resources of a organization.

play01:34

So essentially, we do not look at cyber security as a technological issue alone but we also

play01:43

look at it as a broad or much bigger issue concerning governance and management of organizations.

play01:50

So what are the frameworks that are available what are the standards that are available

play01:54

for cyber security management in practice is a part of this course as I outlined in

play02:01

the previous session.

play02:03

And we would also be looking at technology in a three dimensional perspective, as I explained

play02:13

in the last class, as technology as a source of threat, technology as an asset to be protected

play02:19

and technology also as a tool or as a firewall for protecting your cyber assets.

play02:29

So there are three aspects to technology in this course.

play02:34

And the cyber security challenges are emerging, we have seen that in the last class.

play02:40

So, I am going to bring certain diagrams that actually help you understand the concept of

play02:46

cyber security or information security in a holistic way, understanding what are the

play02:54

different dimensions of it.

play02:57

So one such diagram is this and of course the title is information security, As I explained

play03:03

to you in the last class, cyber security and information security are closely related.

play03:08

Information security is a part of cyber security and it is a most important part of cyber security

play03:15

I would say and therefore you can understand it from multiple dimensions.

play03:21

You can see, there are three major dimensions - information security as the main concept

play03:29

or the main central concept, the main concept and then you can see there are three concentric

play03:35

circles, which constitute three dimensions or three constituents of information security

play03:41

which are network security,computer and data security and management of information security.

play03:50

And in the intersection, you see the intersection, a shaded intersection which actually emerges

play03:59

from the management perspective in terms of color, you can see that but which is central,

play04:04

you know, which is common to all the three.

play04:07

So, in other words, you can see that policy guides, policy is the reference for security

play04:16

related practice, security related decisions, for example, how much should an organization

play04:24

invest in cyber security?

play04:26

We are going to discuss a case today where there is an organization which is invested

play04:31

as much as Pentagon, invests in security.

play04:34

So huge focus on cybersecurity, that may not be the case with all organizations.

play04:41

So the policies would differ from organization to organization, depending on the criticality

play04:49

of the cyber assets and other considerations, that organization choose, chooses.

play04:55

So, they make choices on cybersecurity investments.

play05:00

So the policy is the intersection and policy guides decisions as I said, then you see network

play05:05

security and computer and data security.

play05:09

Other way to think about it is, well, this is about in data and information.

play05:16

So in data and information, there are three aspects, one is data storage, other is data

play05:21

transmission and the third is data processing.

play05:25

So these are the computing elements- data storage devices, data transmission and data

play05:31

processing.

play05:32

So, security pertains to these three aspects of computing.

play05:36

You can see computer and data security involves data, databases and computer means processing.

play05:44

So the applications that process the data.

play05:47

So that is one aspect, storage and processing and the third aspect is data transmission.

play05:53

You can see network security when data or information is transmitted from node A to

play06:00

node B, there is a chance of data breach or you know unauthorized access to the data and

play06:11

therefore that is another aspect or another aspect of computer security or information

play06:16

security.

play06:17

So data storage, data transmission and data processing - three aspects of computing needs

play06:24

protection and should be secured and that is what is represented in this diagram.

play06:31

And, well, in order to do that, you need management practices and management policies . There

play06:39

should be human resources, there should be technology for protecting these assets and

play06:46

there should be decisions on ,how much to protect and how much to leave, how much to

play06:52

leave - that is also a decision management actually, may not over invest in security,

play06:57

we will see that.

play06:58

So all these are pertaining to the administrative dimension of cyber security.

play07:04

So you can see cyber security is not one - cyber security involves all the three and there

play07:10

is a need for understanding and also practicing it, as an integrated effort to protect cyber

play07:20

assets.

play07:22

Now, this is a very important aspect of cyber security as a course, any course in cyber

play07:30

security you do, be it a technology course, be it a management course, you will have these

play07:37

three concepts which will be a common fundamental set of three concepts - Confidentiality, Integrity

play07:47

and Availability.

play07:49

So, this is often called the CIA triangle, CIA triangle.

play07:55

So, what is CIA triangle means one way to understand it is, CIA is the purpose of cyber

play08:09

security,what does cyber security do?

play08:13

Cyber security ensures that confidentiality, integrity and availability of information

play08:23

is secured.

play08:24

So it is like the purpose, what is cyber security’s aim to achieve, it aims to achieve confidentiality,

play08:31

integrity and availability of information,information in the cyber world.

play08:39

Well, that is the most dominant or most important concept, the concept, set of concepts that

play08:46

pertain to cyber security.

play08:48

Of course,the cyber world goes beyond information today , so those aspects we will slowly integrate

play08:54

into the lessons that are coming up but at a fundamental level, if you look at the purpose

play09:00

of information security,it is to ensure these three aspects which are important for computing

play09:10

for it which are important for secured storage processing and transmission of information.

play09:18

So there may be other aspects, other concepts also related to cyber security, for example

play09:24

accountability.

play09:26

So those are related concepts, we will discuss them one by one.

play09:29

So let us try to understand what each of these concepts are,in some more detail as we go.

play09:39

So I will get into each of these concepts in the coming slides but let us have a holistic

play09:44

understanding of cyber security or information security, I am using it, these two terms synonymously

play09:52

now.

play09:53

So, here is an NSTI SSC security model, also known as McCumber cube or John McCumber is

play10:04

the person, who proposed this cube which makes understanding about cyber security holistic,

play10:13

very holistic and if you look at it closely and if you are in the practice of cyber security,

play10:19

this cube ensures that you do not miss anything.

play10:22

do not miss anything, you do not miss any aspect of cyber security.

play10:25

There are three dimensions that McCumber cube actually represents in a cubical form, the

play10:33

first dimension is the computing dimension which we discussed, storage processing transmission

play10:42

these are the three roles of computer systems and that is where your information and data

play10:48

reside.

play10:49

So those are the assets and those are the devices which actually are involved in the

play10:59

storage processing and transmission of data.

play11:02

The second dimension is the objective or the purpose of cyber security which is availability

play11:08

integrity and, sorry, confidentiality, integrity and availability.

play11:12

So when computer systems store, process and transmit data,they should be secure, what

play11:19

does security means - security means confidentiality, integrity and availability.

play11:24

So these three dimensions of computing should be protected with respect to confidentiality

play11:30

integrity and availability.

play11:31

Now how do you do that?

play11:34

How do you actually protect?

play11:35

There are three methods to ensure cyber security, they are number one, policy, number two, education

play11:44

and number three, technology.

play11:47

These are methods to ensure cyber security in terms of confidentiality, integrity and

play11:55

availability for data and information storage, processing and transmission.

play12:01

So it is very intuitive, the important lesson here is, suppose you look at one cell of this

play12:09

cube, it does not miss,it looks at all the three dimensions for example, there is an

play12:15

application so that is for data processing, look at the center dimension.

play12:22

So this is for this particular cell, you will look at it from three dimensions.

play12:28

So for example, this is for data processing and integrity of data processing has to be

play12:35

ensured and this integrity has to be ensured with respect to policy, education and technology.

play12:43

So this, the number of cells of course, you can, you know say, so three into three into

play12:49

three, so each cell is holistic and when as my practicing managers, you can actually ask

play12:55

these questions, you know, are all these cells considered in cyber security?

play13:03

Due attention has been paid to all the three dimensions across all the cells.

play13:08

So that is the, that is another fundamental concept or a fundamental framework to understand

play13:14

cyber security - the McCumber cube.

play13:17

Now, let me also take you through the CIA triangle which we discussed, which I propose

play13:29

as the three objectives or the purpose of cyber security.

play13:35

The first concept is confidentiality.

play13:42

What is confidentiality?

play13:43

Confidential information.

play13:48

So I have heard in administrative circles, if you want to make something public and make

play14:00

a gossip out of something, put some document is so called, you know you want to actually

play14:05

leak it out, put it into an envelope, close this and put a heading - confidential and

play14:12

give it to a clerk, that will be the talk of the town the next day.

play14:17

So the moment you say confidential, you become curious.

play14:21

So people are curious to listen to conversations or tap data which is not theirs.

play14:29

There is a human tendency, sometimes it is out of many reasons.

play14:35

So I can't tell you all the reasons why people want to access others information.

play14:41

There can be malice, there can be evil intentions, there can be fun, there can be, it could be

play14:48

by mistake also.

play14:50

So there could be human errors but it can happen due to several reasons.

play14:55

The purpose of cyber security is to ensure that if person A sends an information to person

play15:02

B and person A wants this to be read only by person B and not by any C, system has to

play15:12

ensure that, this transmission of data from A to B is confidential, that is it is read,

play15:19

only by B and not by C.

play15:24

And three scholars, of course, they are not scholars, they are also entrepreneurs, you

play15:28

must have heard about this name Rivest, Shamir and Adleman, they actually, we will refer

play15:35

to them later on in encryption techniques, when we discuss in a later class.

play15:42

So they published a paper in 1978 in IBM systems journal where they actually represented confidentiality

play15:50

using the diagram that is given here.

play15:52

Alice is sending a confidential letter or a message to Bob and then there is the evil

play15:59

Eve, actually wanting to intersect or wanting to know what is going on.

play16:04

So that is where, the aspect of confidentiality comes.

play16:08

A data which is confidential should be read by only the intended recipient not by anybody

play16:16

else and that is what confidentiality is.

play16:20

And you can think of the application of this concept in so many situations or so many contexts

play16:31

in business and in society.

play16:34

For example, who accesses your private information, who has access to your credits or your academic

play16:46

performance.

play16:47

So, the institute can give access to those who can access it and those who should not

play16:55

access it, as those who are not supposed to access it, should not do it.

play16:59

So the data has to be protected against unauthorized access unauthorized access.

play17:07

And see for example, best example is our Aadhaar database.

play17:12

Aadhaar database is biometric and it is your personal identity.

play17:23

And it is the responsibility of the country to ensure that this is not accessed by people

play17:30

or anyone.

play17:31

It is my data.

play17:32

So, that is where the privacy aspect comes in.

play17:35

And when I shared it with someone, it should be used by that entity or the data processor

play17:44

only with those for whom I have given permission, I have given consent to share the data.

play17:51

There is always a consent between the data collector or the data processor and the data

play17:56

subject.

play17:57

And therefore that contract should be maintained and that is what confidentiality is.

play18:03

Confidentiality is the responsibility of the data collector to ensure that data is shared

play18:11

only with the intended recipients and not with unintended recipients.

play18:17

So how do we actually ensure this?

play18:20

So, in order to ensure confidentiality, there is need for information classification.

play18:28

For example, in an organization there is personal data and there is data about your salaries

play18:38

for example, in a company when you work, And the HR department has to ensure that your

play18:45

salary data is known, can be accessed by maybe certain superiors but not by your peers or

play18:54

your subordinates.

play18:55

There is a policy.

play18:57

So the policy has to be implemented in the database access.

play19:01

Essentially you are ensuring confidentiality as to who can access and who cannot access.

play19:07

So therefore information need to be classified.

play19:10

We will discuss information classification later, as to what is confidential and what

play19:15

is not confidential or what is top secret as in the US military.

play19:19

And then documents have to be secured in terms of storage and the security policies has to

play19:26

be applied and people need to be trained and so on.

play19:30

That is the confidentiality aspect of information.

play19:36

So you will see in systems that ensure confidentiality, when an information passes from Alice to Bob,

play19:44

the jealous Eve may be able to access that data.

play19:48

You may be able to intersect and even if you intersect you cannot actually make out what

play19:54

it is.

play19:55

Caesar cipher, you know, Caesar used to communicate with his commanders through someone.

play20:01

But if someone on the way reads that you do not understand anything.

play20:04

So that is encryption.

play20:06

We will come to that.

play20:07

The second aspect of cyber security is integrity.

play20:13

What do you mean by integrity when you hear this word what comes to your mind?

play20:25

Completeness.

play20:27

Yeah, integrity means purity, completeness.

play20:32

Okay.

play20:33

No compromise on the quality.

play20:36

Yeah it talks about quality.

play20:38

It talks about completeness.

play20:40

It talks about purity.

play20:42

Is that the word you use?

play20:43

Okay.

play20:44

Alright.

play20:45

Okay.

play20:46

So we refer to people, you know, the so and so person does not have integrity and so and

play20:53

so person high integrity.

play20:56

So integration, integrity means whole, the full.

play21:01

So if part is missing, somebody is really good in doing job but somebody gets into malpractices.

play21:12

So we say, integrity is questionable.

play21:16

Some aspect is fine but some aspect is missing.

play21:19

Integrity is that.

play21:20

There is an information that is transmitted from A to B. That is the whole information.

play21:26

At A, it is the whole information but when it reaches B, part of it is missing.

play21:31

For example, you are giving your CV.

play21:32

You are sharing your CV with placement and you have your complete CV.

play21:38

But somebody is jealous about your CV and removes your work experience.

play21:44

Then, I hope it does not happen, but then information is passed.

play21:50

CV is passed but integrity is the problem.

play21:54

Part of the data is stolen or missing or somebody actually changes your work experience.

play22:00

Say, you said, 10 years and somebody makes it 2 years.

play22:05

You alter the data.

play22:07

So you also manipulate it.

play22:09

All that is about the integrity of the data.

play22:13

So when data passes from A to B, the data should reach B intact.

play22:19

We call it intact, without any damage, without any manipulation, without any change and it

play22:26

should be as it is.

play22:28

That is the integrity aspect of data.

play22:32

And in practical scenarios, for example if you share your data in with your employer

play22:44

and employer does not give you access to your personal data or your professional or your

play22:54

bio data.

play22:55

And suppose you did a certificate program or you updated your, you want to update your

play23:00

CV.

play23:01

But as an employee, they do not give you access to your data.

play23:05

Then again, it is a matter of integrity.

play23:07

You are not able to update your data.

play23:11

And today, by regulation it is required that when a data, a subject shares the data with

play23:21

a data controller or a data collector, the subject should have access to that data wherever

play23:29

it is stored.

play23:30

I should be able to make changes to that data.

play23:32

It is my data and I should have access to it.

play23:36

It is one of the privacy rights.

play23:38

It is also about the integrity of the data.

play23:40

The data is incomplete.

play23:42

And suppose, it can also happen when somebody entered that data into a database, your date

play23:47

of birth is entered wrong.

play23:50

And date of birth matters in employment.

play23:53

Suppose you are born in year 2000, suppose it is entered as 2010, there is a big problem

play24:01

out there.

play24:02

Even one year change can actually affect your promotions and so many things.

play24:06

So it affects you and you are the affected party, others may not mind.

play24:10

So it is somebody else's problem but user must have access.

play24:13

So it is a problem of data integrity, essentially.

play24:16

So it reflects in so many aspects in organizations, in government and in so many other settings.

play24:22

So integrity is therefore a very fundamental aspect of information security.

play24:30

Confidentiality and then integrity.

play24:33

Who has access to your data and protecting your data without damage.

play24:38

That is the second aspect.

play24:39

And the third dimension of cyber security is availability.

play24:49

Well, availability is the other side of confidentiality.

play25:00

Data should not be available to unintended audience.

play25:04

But data should be available, when it is required by the intended party.

play25:11

When you are in need of information, it should be accessible and available.

play25:17

So it is the other side.

play25:18

It should not be accessed by someone who does not have access rights but it should be accessible

play25:24

and always accessible as per contract, based on the contract.

play25:29

And therefore availability is very critical in certain business context.

play25:40

Availability of databases.

play25:43

Suppose you are trying to book a ticket, an airline ticket or train ticket in IRCTC.

play25:51

And you try to log in, you log in and you are about to reserve but the database is not

play25:58

available, it is down.

play26:00

And maybe you want to browse and see your past reservations some information you want

play26:04

but the database is not accessible.

play26:06

You have signed in and therefore you have the privilege to access your data.

play26:11

It’s your data, you are not accessing somebody else's.

play26:14

You are within confidentiality but the system should allow you to access your information

play26:21

when you are in need of it.

play26:24

And this is the time for you to make a reservation and the data is not available.

play26:27

It is a problem of availability.

play26:30

So, in order for computing systems to ensure availability, they need to make provisions

play26:39

for that.

play26:40

Cyber security management requires to ensure data is available to those who are intended

play26:47

recipients of the data.

play26:50

And availability is related to reliability.

play26:58

If systems are reliable, they will be available.

play27:02

So therefore, reliability engineering, especially in computer systems, ensures the availability

play27:11

of data or databases or access to computing resources using a method known as redundancy.

play27:24

Redundancy is the word.

play27:27

So,how much of redundancy, if one system is down, the processing or access should not

play27:34

stop, should be available from other systems.

play27:36

So availability by redundancy.

play27:39

So I am just giving a clue as to how technologically you will ensure availability and availability

play27:45

is also a function of how much.

play27:49

There is a 99.9999 so the number of nines after the decimal point.

play27:57

So, that is a sort of contract also when it comes to B2B in terms of IT contracts, in

play28:03

terms of availability.

play28:04

So when critical systems run on IT, availability is critical and therefore by contract, by

play28:10

service level agreements, there will be contractual arrangement between parties to ensure availability

play28:16

of systems.

play28:18

And therefore if a client is asking for more availability, you can imagine the service

play28:23

provider has to invest more in redundancy.

play28:26

And therefore, the cost will be higher.

play28:28

So therefore, you can always ask for 100 percent availability but 100 percent comes at a, sometimes

play28:34

an infinite cost.

play28:36

So, these are concepts that are related to cyber security - confidentiality, integrity

play28:45

and availability and these three terms, even if you forget everything else, should be by

play28:51

heart to you, as students of cyber security.

play28:54

Even if you have woken up in the middle of the night, what is cyber security doing? confidentiality,

play28:59

integrity and availability.

play29:00

So there should be straight recall of these three concepts.

play29:06

Let me illustrate it with an example.

play29:09

So there is an image of course, what does it take you to, this image, biometric, the

play29:19

yeah, the retinal.

play29:22

So somebody is taking a biometric scan of the eye.

play29:27

It can be different aspects of the eye, we will see that later.

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecurityPrivacyInformation SecurityConfidentialityIntegrityAvailabilityManagement PracticesPolicy FrameworksData ProtectionSecurity ChallengesTechnological Assets