Table of Contents
Exam Objectives 📚
Cybersecurity
Information security
Information systems security
Information assurance
Cyber resilience
Cybersecurity incident
Stakeholder
Supplier
Critical infrastructure
Threats
Vulnerabilities
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Navigating the cybersecurity landscape requires a solid grasp of fundamental concepts. This chapter aims to equip you with the essential knowledge needed to effectively implement the NIST Cybersecurity Framework.
Understanding these key terms will help you communicate and collaborate efficiently with others in the field, ensuring everyone is on the same page and reducing the risk of misunderstandings.
If you've already passed certifications like CompTIA Security+, CySA+, PenTest+, CASP+, ISACA’s CISM, or ISC2’s SSCP and CISSP, this chapter will serve as a review. For those new to these concepts, let's break down some of the basics.
How Do You Define Cybersecurity? 📖
Term | Definition | So What? |
|---|---|---|
Information Security | Refers to the protection of information and data assets from unauthorized access, use, disclosure, alteration, or destruction Security measures, policies, procedures, and controls All forms of information | Information protection focused: e.g. encryption and least privilege access controls What about the system itself, that can store, process or transmit information (data)? 🤔 |
Information Systems Security | Refers to the protection of computer systems and the associated infrastructure that store, process, transmit, and manage information Protect Computer Systems and Infrastructure Measures, Policies, Procedures, and Controls Computer Hardware, Software, Networks and Databases | System and network infrastructure focused. Examples: deployment of firewalls, intrusion detection systems, and antivirus software to protect a company’s network infrastructure and systems from external threats. “Amateurs hack systems, professionals hack people.” - Bruce Schneier Beyond blinky light network appliances, what about the human firewall? 🤔 |
Information Assurance | Encompasses both Information Security and Information System Security Beyond Technical Controls: integrating People, Processes, and Technology | This broader, newer concept, emphasizes a more holistic approach of ensuring confidentiality, integrity, availability, and non-repudiation of information A comprehensive program is needed that includes security policies, regular risk assessments, security awareness training, incident response planning, and ongoing monitoring. Can we get a cooler name please? 😎 |
Cybersecurity | Focuses on protecting computer systems, networks, and digital information from cyber threats, which include unauthorized access, cyber-attacks, data breaches, and other malicious activities conducted through digital means. Involves a combination of technical, operational, and managerial measures to identify, protect, detect, respond to, and recover from cyber incidents. | The new term for Information Security Focuses on modern threats and modern technologies. Involves a combination of technical, operational, and managerial measures to identify, protect, respond to, and recover from cyber incidents. Some examples include multi-factor authentication, conducting regular vulnerability assessments, and establishing incident response plans. |
The CIANA Pentagon 🛡
A crucial part of your cybersecurity foundation is understanding the CIANA pentagon, which stands for:
Term | Definition | So What? |
|---|---|---|
Confidentiality | Refers to the protection of sensitive information from unauthorized access or disclosure by ensuring that only authorized individuals or entities can access and view confidential data | Protect sensitive information Mitigate the risk of data breaches and unauthorized disclosures Maintain trust Meet compliance requirements associated with various privacy regulations |
Integrity | Ensures that data remains accurate, consistent, and unaltered throughout its lifecycle by protecting it against unauthorized modification, deletion, or corruption | Ensure data remains unaltered Protect from fraud or worse |
Availability | Refers to the accessibility and usability of digital assets and services when needed | Ensure resources are available There’s little tolerance for downtime from internal and external customers |
Non-repudiation | The assurance that the originator of a digital communication or transaction cannot deny their involvement or the authenticity of the data being exchanged | Prevent denial of involvement Deep fakes Audit trail |
Authentication | Verifies the identity of individuals or entities attempting to access digital systems or resources | Verify user identities Social engineering Unauthorized access |
Cybersecurity incidents 🚨
Term | Definition | So What? |
|---|---|---|
Cybersecurity Incident | Any unauthorized or malicious event that compromises the confidentiality, integrity, or availability of an organization’s digital assets, systems, or networks. | 2022 average cost of a data breach: $4.2 million |
Cybersecurity incidents result from vulnerabilities being exploited by threats.
Term | Definition | So What? |
|---|---|---|
Risk | The potential for loss, damage, or harm resulting from the occurrence of threats exploiting vulnerabilities in digital systems or assets | If there is no threat to exploit a vulnerability, or there is no vulnerability for the threat actor to exploit, then there cannot be a risk, negative consequence, or cybersecurity incident |
Threat | Any potential source or actor that has the capability to exploit a vulnerability, weakness, or flaw that causes harm to an organization’s digital systems, networks, or data | Cybercriminals want to steal your money, identity and critical data Hurricanes causing power outages can render your network and systems unusable |
Vulnerability | A weakness or flaw in a system, network, or software that a threat actor can exploit to compromise the security and integrity of digital assets | It might not be practical for a hospital to immediately pull the plug on an end-of-life version of Microsoft Windows on its file servers. They need your help to make a road map that reduces their cyber risk over time |
Risk = Threat x Vulnerability ⚠
Risk (⬆️) = Threat(⬆️) x Vulnerability(↔️)
If the threat increases while the vulnerability remains the same, then the overall risk will increase.
Risk (⬆️) = Threat(↔️) x Vulnerability(⬆️)
If the vulnerability increases while the threat remains the same, then the overall risk will increase.
Risk (↔️) = Threat(⬇️) x Vulnerability(⬆️)
If an organization wants to keep its risk at a given level, then as the vulnerability increases, countermeasures must be put into place to reduce the threat of exploitation.
Risk (↔️) = Threat(⬆️) x Vulnerability(⬇️)
On the other hand, if the threat increases, then the organization must reduce the vulnerability’s exposure to maintain the same level of risk.
Conclusion and Touchpoints ✅
“Words have meaning”
CIANA pentagon: five core principles of cybersecurity that form the foundation for protecting digital assets and maintaining secure environments
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Risk is proportional to Threats and Vulnerabilities.
This relationship helps us understand mitigations and how to manage risk



