Auto saved by Logseq

This commit is contained in:
Ryan 2023-06-15 17:48:15 +08:00
parent 833efef253
commit 143c15d37d

View file

@ -2185,7 +2185,219 @@
l marketing issues l marketing issues
l red tape (bureaucracy) l red tape (bureaucracy)
- ## Topic 19 - ## Topic 19
- - What is Cybersecurity?\n什么是网络安全
Cybersecurity is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks
网络安全是应用技术、程序和控制来保护系统、网络、程序、设备和数据免受网络攻击。
It aims to reduce the risk of cyber attacks, and protect against the unauthorised exploitation of systems, networks and technologies
它的目的是减少网络攻击的风险,并保护系统、网络和技术不被非法利用。
Increasingly implemented through laws and regulations
越来越多地通过法律和法规来实施
Three distinct legal elements: information security, privacy and data protection, and cybercrime
三个不同的法律要素:信息安全、隐私和数据保护,以及网络犯罪
Information Security信息安全
Seeks to protect all information assets, whether in hard copy or in digital form
寻求保护所有的信息资产,无论是硬拷贝还是数字形式的信息。
Information is one of the most valuable assets
信息是最有价值的资产之一
Good business practice
良好的商业惯例
Digital revolution changed how people communicate and conduct business
数字革命改变了人们的沟通方式和业务开展方式
Digital revolution changed how people communicate and conduct business
数字革命改变了人们的沟通方式和业务开展方式
Privacy and Data Protection隐私和数据保护
Number of different, but related concepts
不同但相关的概念的数量
Control of personal data
个人数据的控制
Control = the ability to specify the collection, use, and sharing of their data
控制=有能力指定收集、使用和分享他们的数据
Personal information private x publicly available
个人信息--私人的x公开的
Data privacy are the regulations, or policies, that governs the use of my data when shared with any entity, while data protection is the mechanism — that is, the tools and procedures — to enforce the policy and regulation, including the prevention of unauthorized access or misuse of the data that I agreed to share
数据隐私是管理我的数据在与任何实体共享时的使用的法规或政策,而数据保护是执行政策和法规的机制,即工具和程序,包括防止未经授权访问或滥用我同意共享的数据。
Information Security x Privacy信息安全x隐私
Information security and privacy are closely related, but distinct concepts
信息安全和隐私是密切相关的,但又是不同的概念
Privacy is an individuals right to control the use and disclosure of their own personal information
隐私是个人控制自己的个人信息的使用和披露的权利。
Information security is the process used to keep data private
信息安全是用于保护数据隐私的过程
Security is the process; privacy is the result
安全是过程;隐私是结果
Cybercrime网络犯罪
Cybercrime is an act that violates the law, by using information and communication technology (ICT) to either target networks, systems, data, websites and/or technology or facilitate a crime
网络犯罪是一种违反法律的行为它利用信息和通信技术ICT以网络、系统、数据、网站和/或技术为目标,或为犯罪提供便利。
Cybercrime knows no physical or geographic boundaries and can be conducted with less effort, greater ease, and at greater speed and scale than traditional crime
网络犯罪不受物理或地理边界的限制,与传统犯罪相比,可以更省力、更容易、更快速、更大规模地进行。
Drivers of Cybersecurity网络安全的驱动因素
Legal and regulatory法律和监管
Growing legal framework establishing safeguarding and information obligation
建立保障和信息义务的法律框架不断增强
Growing enforcement as a response to ineffective self-regulation
作为对无效自律的回应,执法力度不断增强
Commercial商业
Growing awareness of risk, economic and legal consequences, trustworthiness of business transactions
对风险、经济和法律后果、商业交易的可信度的认识不断提高
Technical技术
With technological innovation comes opportunities as well as risks
技术创新带来了机遇,也带来了风险
Information Security信息安全
Information Security I
Processes, procedures and infrastructure to preserve: confidentiality integrity, and availability of information
流程、程序和基础设施,以保持 - 信息的保密性 - 完整性,以及 - 可用性
Information Security II
Confidentiality保密性
Confidentiality I
Confidentiality means that only people with the right permission can access and use information
保密性是指只有获得适当许可的人才能访问和使用信息。
Protecting information from unauthorised access at all stages of its life cycle
保护信息在其生命周期的所有阶段免遭未经授权的访问
Information must be created, used, stored, transmitted, and destroyed in ways that protect its confidentiality
信息的创建、使用、存储、传输和销毁必须以保护其机密性的方式进行。
Confidentiality II
Ensuring confidentiality encryption, access controls
确保保密性 - 加密、访问控制
Compromising confidentiality (intentional) shoulder surfing, social engineering; (accidental) publication
破坏保密性--(故意)肩上冲浪、社会工程;(意外)发布
It may result in identity theft, threats to public safety
它可能导致身份被盗,威胁到公共安全
Example
Integrity
Integrity means that information systems and their data are accurate
完整性意味着信息系统及其数据是准确的
Changes cannot be made to data without appropriate permissions
没有适当的权限,不能对数据进行更改
Ensuring integrity controls ensuring the correct entry of information, authorization, antivirus
确保完整性--确保信息的正确输入、授权、防病毒的控制。
Compromising integrity (intentional) employee or external attacks; (accidental) employee error
破坏完整性--(故意的)雇员或外部攻击;(意外的)雇员错误
Example
Authentication认证
Specific to integrity and confidentiality considerations
具体到完整性和保密性的考虑
Authentication is the process of validating the identity of a registered user or process before enabling access to protected networks and systems.
认证是在允许访问受保护的网络和系统之前验证注册用户或程序的身份的过程。
Analogue : signatures, handwriting, in person attestation, witnesses, notary
类比:签名、笔迹、当面证明、证人、公证
Digital : username and password, digital signatures, fingerprints or face recognition
数字化:用户名和密码、数字签名、指纹或面部识别
Availability可利用性
Availability is the security goal of making sure information systems are reliable
可用性是确保信息系统可靠的安全目标。
Data is accessible
数据是可以访问的
Individuals with proper permission can use systems and retrieve data in a dependable and timely manner
拥有适当权限的个人可以使用系统,并以可靠和及时的方式检索数据。
Ensuring availability recovery plans, backup systems
确保可用性--恢复计划、备份系统
Compromising availability (intentional) denial of service (DoS) attack, (accidental) outage
破坏可用性 - 故意拒绝服务DoS攻击意外中断
Example
Information Security信息安全
= Mitigating risks to the trustworthiness of information of corporations and governments by the:=减轻公司和政府的信息可信度的风险,由:
Development of strategies and制定战略和
Implementation to technologies and procedures in order to preserve its confidentiality, integrity, and availability实施技术和程序以保护其机密性、完整性和可用性
Information Security Key Concepts信息安全的关键概念
Risk management as means to justify information security laws = process of listing the all the relevant factors and taking steps to control them where possible
风险管理是证明信息安全法的手段=列出所有相关因素并尽可能采取措施控制它们的过程。
There are four main concepts: Vulnerabilities ,Threats ,Risks ,Safeguards
有四个主要概念: 脆弱性、威胁、风险、保障措施
Vulnerabilities 漏洞
Vulnerabilities I
= weakness or flaw in the information system that can be exploited= 信息系统中可被利用的弱点或缺陷
Construction, design mistake建筑、设计错误
Flaws in how internal safeguards are used/not used, based on:在如何使用/不使用内部保障措施方面存在缺陷,依据是:
People
Process
Facility 设施
Technology
Vulnerabilities II
People
separation of duties principle职责分离原则
two or more people need to split a critical task functions两个或两个以上的人需要分担一个关键任务的职能
Process
flaws in organizations procedures
missing step in a checklist /no checklist
failure to apply hardware and software patches
= patch is a software/code that updates a program to address security problems=补丁是一种软件/代码,用于更新程序以解决安全问题
Vulnerabilities III
Facility
flaws in physical infrastructure有形基础设施的缺陷
fences, locks, CCTV cameras围栏、门锁、闭路电视摄像机
Technology
design flaws设计缺陷
unpatched applications, improperly configured equipment未打补丁的应用程序配置不当的设备
Successful attacks take place when vulnerability is exploited成功的攻击发生在漏洞被利用的时候
Threats 
Threats I
= anything that can cause harm to an information system successful exploits of vulnerabilities=任何能对信息系统造成伤害的东西 - 成功利用漏洞的行为
Relationship between a vulnerability and a threat脆弱性和威胁之间的关系
An organization does not have sufficient controls to prevent an employee from deleting critical computer files (lack of controls vulnerability). An employee could delete files by mistake (employee source of threat) (deleting critical files threat). If the files are deleted, successful exploit of the vulnerability has taken place. If the file is not recoverable, the incident harms the organizations and its security. Availability is compromised.
一个组织没有足够的控制措施来防止员工删除关键的计算机文件(缺乏控制措施--漏洞)。雇员可能会错误地删除文件(雇员-威胁源)(删除关键文件-威胁)。如果文件被删除,就说明已经成功利用了该漏洞。如果文件无法恢复,该事件就会损害组织和它的安全。可用性受到影响。
Threats II
Human
Internal and external, includes well-meaning employees and external attackers内部和外部包括善意的雇员和外部攻击者
Natural
uncontrollable events (fire, flood)不可控制的事件(火灾、洪水)
Technology and operational
operate inside information systems (malicious code, hardware and software failures)在信息系统内部操作(恶意代码、硬件和软件故障)。
Physical and environmental lack of physical securit物理和环境--缺乏实体安全y
Accidental or intentional意外或故意的
Internal or external attackers内部或外部攻击者
Threats III
Threats to information, networks, systems have increased对信息、网络、系统的威胁已经增加
More devices, more use, more always on更多的设备更多的使用更多的 "永远在线"。
More complex networks with greater attack surface更复杂的网络有更大的 "攻击面"。
Bring your own device (BYOD) means that end points of corporate networks no longer in their control; more points of entry into enterprise networks自带设备BYOD意味着企业网络的终端不再受其控制有更多的点进入企业网络
More devices with IoT; smart watches possibly not connected to enterprise authentication systems更多的设备具有物联网功能智能手表可能没有与企业认证系统相连
Attacks have grown more sophisticated攻击已变得更加复杂
Sonys servers wiped after internal communications stolen, but held for months索尼的服务器在内部通信被盗后被抹去但被扣留了几个月
Attacks that take months to achieve goals; undetected需要数月才能实现目标的攻击未被发现的攻击
'Ransomware = threat to encrypt data unless paid赎金软件"=威胁要加密数据,除非付费
SolarWind cyberattackSolarWind的网络攻击
Risks 
Risks I
Risks II
Risks III
Safeguards
Safeguards I
= safeguard reduces the harm posed by information security vulnerabilities or threats=保障措施减少信息安全漏洞或威胁所带来的危害
Safeguards II
Safeguards III
Safeguards can be put in place at all layers of the system:保障措施可以在系统的所有层级落实到位:
可以在系统的所有层实施安全措施 :\n在物理硬件或设备层例如通过物理保护服务器机房免受水淹\n在各种软件层例如通过安装最新的补丁\n在网络层例如通过使用虚拟专用网 (“VPN”);而且,\n在用户层确保所有人员接受适当的培训以识别网络钓鱼电子邮件和其他形式的社会工程。
Exercise
Information Security Management
有效评估组织的安全需求,评估和选择各种安全产品和策略 将信息分类 确定法律义务 评估漏洞、威胁和风险 保护 有许多挑战 标准的发展
ISO/IEC
27001
27001:2022信息安全管理系统 全球最著名的信息安全管理系统标准 (ISMS) 它定义了 ISMS必须满足的要求 该标准为各种规模和各种行业的公司提供了建立、实施、维护和持续改进信息安全管理系统的指导 符合 ISO/IEC 27001标准意味着一个组织或企业已经建立了一个系统来管理与公司拥有或处理的数据的安全性相关的风险
ISMS规范 从自上而下的角度衡量、监控和控制安全管理的方法 第 2部分定义了一个六步“流程”本质上是 : 定义安全策略 定义 ISMS的范围 进行风险评估 管理风险 选择要实施的控制目标和控制 准备一份适用性声明
27002
27002:2022信息安全、网络安全和隐私保护—信息安全控制 本文档提供了一套通用信息安全控制参考,包括实施指南 本文档旨在供以下组织使用 : 在基于 ISO/IEC27001的信息安全管理系统 (ISMS)的范围内; 根据国际公认的最佳实践实施信息安全控制; 用于制定特定于组织的信息安全管理准则 确定每项控制的目标、工作原理以及公司如何成功实施
Summary
信息安全是保护信息这一宝贵资产的研究和实践\n信息安全的主要目标是保护信息的机密性、完整性和可用性 (CIA)\n关键的信息安全概念包括漏洞、威胁、风险和安全措施\n实施信息安全的法律义务和激励措施\n标准的重要性
- LATER 概率论 (隔了一个周末) - LATER 概率论 (隔了一个周末)
collapsed:: true collapsed:: true
SCHEDULED: <2023-06-19 Mon> SCHEDULED: <2023-06-19 Mon>