Cybersecurity- Understanding the Fundamentals I (Basic Concepts)

Before starting our exciting journey to the cyberland, to be able to talk the same language you need to get familiar with fundamental terminology and acronyms. Please check them out first. I do not expect you to memorize them but you should be familiar with the terms and abbreviations. In this first part of the fundamentals of cybersecurity series, we review the basic terms and the main pillars of cybersecurity such as CIA Triad, the Cyber Kill Chain, MITRE ATT&CK and the Diamond Model.

IT Security vs Cybersecurity vs Network Security

IT Security is the set of defenses put in place to counter threats to technology infrastructure and data resources. IT security ensures protection for both physical and digital data.

Cybersecurity is the act of securing and protecting individuals, businesses, organizations, and governments that are connected to the Internet and the Web. Cybersecurity, a subset of information security (or IT security, also known as InfoSec).

Network Security is to protect networking components, connections, and contents. Network security, a subset of cybersecurity.

Image for post
Image for post
IT Security vs Cybersecurity vs Network Security

CIA Triad

Image for post
Image for post
CIA Triad

Confidentiality, Integrity, and Availability Model and Related Impact figure by ISACA may give you a better idea about CIA Triad.

Image for post
Image for post
Confidentiality, Integrity, and Availability Model and Related Impact by ISACA

Cybersecurity Threat Agents

Image for post
Image for post
Cybersecurity Threat Agents by ENISA

The Cyber Kill Chain, MITRE ATT&CK, The Diamond Model

Image for post
Image for post
The Cyber Kill Chain by Lockheed Martin

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

Image for post
Image for post
MITRE ATT&CK

The Diamond Model of intrusion analysis, comprising the core features of an intrusion event: adversary, capability, infrastructure, and victim. The core features are linked via edges to represent the fundamental relationships between the features that can be exploited analytically to further discover and develop knowledge of the malicious activity. The meta-features are listed as well, and while not core features, highlights their importance in higher-order analysis, grouping, and planning functions.

Image for post
Image for post
The Diamond Model of Intrusion Analysis

Cybersecurity | Artificial Intelligence | Blockchain

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store