Cybersecurity is a set of techniques to protect secrecy, integrity, and availability of computer systems and data against threats.
To achieve these three general golas, security experts start with a specification of who your 'enemy' is, at an abstract level, called a threat model.
This profiles attackers: their capabilities, goals, and probable means of attack, is called an attack vector.
Two main security questions:
1. Who are you?
2. What should you have access to?
Differentiate between right and wrong people.
3 types of authentication:
Two-fractor, Multi-factor authentication - Each method has its pros and cons and can be compromised in one way or other, so two or more forms of authentication should be used for security.
Once a system knows who you are, it needs to know that you should be able to access.
This is done through Permissions or Access Control Lists (ACL), which describe what access each user has for every file, folder and program on a computer.
For organizations with users at different levels of access priviliege, it's especially important for Access Control Lists to be configuered corretly.
General Rule - Bell-LaPadula model
1. No "Read Up"
2. No "Write Down"
One of the holy grails of system level security is a security kernel or a trusted computing base: a minimal set of operating system software that's close to provably secure.
Formally verifying the security of code is an active area of research.
Independent verification & Validation - The process of having code audited by a crowd of security-minded developers.
Isolation - a principle, when program is compromised, the damage should be limited and contained, and not let it compromise other things running on the computer.
To achieve isolation, we can "sandbox" application.
Your Crash Course on Cybersecurity is a fantastic resource, providing a concise yet insightful overview of key concepts. For those interested in further exploring the intersection of technology and security, I recommend checking out this comprehensive guide on healthcare cybersecurity: https://www.cleveroad.com/blog/healthcare-cybersecurity/. It offers valuable insights into securing sensitive medical data in today's dynamic digital landscape.