© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 8:
Becoming a Cybersecurity
Specialist
Cybersecurity Essentials v1.1
Presentation ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 8 - Sections & Objectives
8.1 Cybersecurity Domains
Describe resources available to students interested in pursuing a career in
cybersecurity.
8.2 Understanding the Ethics of Working in Cybersecurity
Explain how ethics provide guidance.
8.3 Next Step
Explain how to take the next step to become a cybersecurity professional.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
8.1 Cybersecurity Domains
Presentation ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cybersecurity Domains
User Domain
Common User Threats and Vulnerabilities
 The User Domain includes the users who access the organization’s
information system.
 Users can be employees, customers, business contractors and other
individuals that need access to data.
 Users are often the weakest link in the information security systems and
pose a significant threat to the confidentiality, integrity, and availability of
the organization’s data.
Managing User Threats
 Conduct security awareness training and user education.
 Enable and automate content filtering and antivirus scanning.
 Disable internal CD drives and USB ports.
 Minimize permissions, restrict access, track and monitor users and enable
intrusion detection.
Presentation ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cybersecurity Domains
Device Domain
Common Threats to Devices
Presentation ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Local Area Network Domain
Common Threats to the LAN
Presentation ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Private Cloud (WAN) Domain
Common Threats to the Private Cloud:
Presentation ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Public Cloud Domain
Common Threats to the Public Cloud:
Presentation ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Physical Facilities Domain
Common Threats to Physical Facilities:
Presentation ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Application Domain
Common Threats to Applications:
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
8.2 Understanding the Ethics
of Working in Cybersecurity
Presentation ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Understanding the Ethics of Working in Cybersecurity
Ethics and Guiding Principles
Ethics of a Cybersecurity Specialist
Ethics is the little voice in the background guiding a cybersecurity
specialist as to what he should or should not do, regardless of
whether it is legal. The organization entrusts the cybersecurity
specialist with the most sensitive data and resources. The
cybersecurity specialist needs to understand how the law and the
organization’s interests help to guide ethical decisions.
Computer Ethics Institute
The Computer Ethics Institute is a resource for identifying,
assessing, and responding to ethical issues throughout the
information technology industry. CEI was one of the first
organizations to recognize the ethical and public policy issues
arising from the rapid growth of the information technology field.
Presentation ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability
Laws prohibit undesired behaviors. Unfortunately, the advancements in
information system technologies are much faster than the legal system can
accommodate. A number of laws and regulations affect cyberspace.
Cybercrime
A computer may be involved in a cybercrime in a couple of different ways.
There is computer-assisted crime, computer-targeted crime, and computer-
incidental crime. Child pornography is an example of computer-incidental
crime; the computer is a storage device and is not the actual tool used to
commit the crime.
Organizations Created to Fight Cybercrime
There are a number of agencies and organizations out there to aid the fight
against cybercrime.
Presentation ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability (Cont.)
Civil, Criminal, and Regulatory Cyber Laws
 In the United States, there are three primary sources of laws and
regulations: statutory law, administrative law, and common law. All three
sources involve computer security. The U.S. Congress established federal
administrative agencies and a regulatory framework that includes both
civil and criminal penalties for failing to follow the rules.
Industry Specific Laws
 Gramm-Leach-Bliley Act (GLBA)
 Sarbanes-Oxley Act (SOX)
 Payment Card Industry Data Security Standard (PCI DSS)
 Import/Export Encryption Restrictions
Security Breach Notification Laws
 Electronic Communications Privacy Act (ECPA)
 Computer Fraud and Abuse Act (1986)
Presentation ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Understanding the Ethics of Working in Cybersecurity
Cyber Laws and Liability (Cont.)
Protecting Privacy
 Privacy Act of 1974
 Freedom of Information ACT (FOIA)
 Family Education Records and Privacy Act (FERPA)
 U.S. Computer Fraud and Abuse Act (CFAA)
 U.S. Children’s Online Privacy Protection Act (COPPA)
 U.S. Children’s Internet Protection Act (CIPA)
 Video Privacy Protection Act (VPPA)
 Health Insurance Portability & Accountability Act
 California Senate Bill 1386 (SB 1386)
International Laws
 Convention on Cybercrime
 Electronic Privacy Information Center (EPIC)
Presentation ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cybersecurity Information Websites
National Vulnerability Database (NVD) - is a U.S. government repository of
standards-based vulnerability management data that uses the Security Content
Automation Protocol (SCAP).
CERT - The Software Engineering Institute (SEI) at Carnegie Mellon University
helps government and industry organizations to develop, operate, and maintain
software systems that are innovative, affordable, and trustworthy. It is a Federally
Funded Research and Development Center sponsored by the U.S. Department of
Defense.
Internet Storm Center - provides a free analysis and warning service to Internet
users and organizations. It also works with Internet Service Providers to combat
malicious cyber criminals. The Internet Storm Center gathers millions of log entries
from intrusion detection systems every day using sensors covering 500,000 IP
addresses in over 50 countries.
The Advanced Cyber Security Center (ACSC) - is a non-profit organization that
brings together industry, academia, and government to address advanced cyber
threats. The organization shares information on cyber threats, engages in
cybersecurity research and development, and creates education programs to promote
the cybersecurity profession.
Presentation ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cybersecurity Weapons
Vulnerability Scanners - assess computers, computer systems, networks, or
applications for weaknesses. Vulnerability scanners help to automate security
auditing by scanning the network for security risks and producing a prioritized list
to address weaknesses.
Penetrating Testing (or pen testing) - is a method of testing the areas of
weaknesses in systems by using various malicious techniques. Pen testing is not the
same as vulnerability testing. Vulnerability testing just identifies potential
problems. Pen testing involves a cybersecurity specialist who hacks a website,
network, or server with the organization’s permission to try to gain access to
resources without the knowledge of usernames, passwords, or other normal means.
Packet Analyzers (or packet sniffers) - intercept and log network traffic. The
packet analyzer captures each packet, shows the values of various fields in the
packet, and analyzes its content. A sniffer can capture network traffic on both wired
and wireless networks.
Security Tools - There is no one size fits all when it comes to the best security
tools. Much depends on the situation, circumstance, and personal preference. A
cybersecurity specialist must know where to go to get sound information.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
8.3 Next Step
Presentation ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Next Step
Exploring the Cybersecurity Profession
Defining the Roles of Cybersecurity Professionals
The ISO standard defines the role of cybersecurity professionals. The ISO 27000
framework requires:
 A senior manager responsible for IT and ISM (often the audit sponsor)
 Information security professionals and security administrators
 Site/physical security manager and facilities contacts
 HR contact for HR matters such as disciplinary action and training
 Systems and network managers, security architects and other IT professionals
Job Search Tools
A variety of websites and mobile applications advertise information technology
jobs. Each site targets varying job applicants and provides different tools for
candidates researching their ideal job position:
 Indeed.com
 CareerBuilder.com
 USAJobs.gov
Presentation ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Cisco cybersecurity essentials chapter 8

  • 1.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 8: Becoming a Cybersecurity Specialist Cybersecurity Essentials v1.1
  • 2.
    Presentation ID 2©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 8 - Sections & Objectives 8.1 Cybersecurity Domains Describe resources available to students interested in pursuing a career in cybersecurity. 8.2 Understanding the Ethics of Working in Cybersecurity Explain how ethics provide guidance. 8.3 Next Step Explain how to take the next step to become a cybersecurity professional.
  • 3.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3 8.1 Cybersecurity Domains
  • 4.
    Presentation ID 4©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cybersecurity Domains User Domain Common User Threats and Vulnerabilities  The User Domain includes the users who access the organization’s information system.  Users can be employees, customers, business contractors and other individuals that need access to data.  Users are often the weakest link in the information security systems and pose a significant threat to the confidentiality, integrity, and availability of the organization’s data. Managing User Threats  Conduct security awareness training and user education.  Enable and automate content filtering and antivirus scanning.  Disable internal CD drives and USB ports.  Minimize permissions, restrict access, track and monitor users and enable intrusion detection.
  • 5.
    Presentation ID 5©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cybersecurity Domains Device Domain Common Threats to Devices
  • 6.
    Presentation ID 6©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Local Area Network Domain Common Threats to the LAN
  • 7.
    Presentation ID 7©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Private Cloud (WAN) Domain Common Threats to the Private Cloud:
  • 8.
    Presentation ID 8©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Public Cloud Domain Common Threats to the Public Cloud:
  • 9.
    Presentation ID 9©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Physical Facilities Domain Common Threats to Physical Facilities:
  • 10.
    Presentation ID 10©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Application Domain Common Threats to Applications:
  • 11.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11 8.2 Understanding the Ethics of Working in Cybersecurity
  • 12.
    Presentation ID 12©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Understanding the Ethics of Working in Cybersecurity Ethics and Guiding Principles Ethics of a Cybersecurity Specialist Ethics is the little voice in the background guiding a cybersecurity specialist as to what he should or should not do, regardless of whether it is legal. The organization entrusts the cybersecurity specialist with the most sensitive data and resources. The cybersecurity specialist needs to understand how the law and the organization’s interests help to guide ethical decisions. Computer Ethics Institute The Computer Ethics Institute is a resource for identifying, assessing, and responding to ethical issues throughout the information technology industry. CEI was one of the first organizations to recognize the ethical and public policy issues arising from the rapid growth of the information technology field.
  • 13.
    Presentation ID 13©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Understanding the Ethics of Working in Cybersecurity Cyber Laws and Liability Laws prohibit undesired behaviors. Unfortunately, the advancements in information system technologies are much faster than the legal system can accommodate. A number of laws and regulations affect cyberspace. Cybercrime A computer may be involved in a cybercrime in a couple of different ways. There is computer-assisted crime, computer-targeted crime, and computer- incidental crime. Child pornography is an example of computer-incidental crime; the computer is a storage device and is not the actual tool used to commit the crime. Organizations Created to Fight Cybercrime There are a number of agencies and organizations out there to aid the fight against cybercrime.
  • 14.
    Presentation ID 14©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Understanding the Ethics of Working in Cybersecurity Cyber Laws and Liability (Cont.) Civil, Criminal, and Regulatory Cyber Laws  In the United States, there are three primary sources of laws and regulations: statutory law, administrative law, and common law. All three sources involve computer security. The U.S. Congress established federal administrative agencies and a regulatory framework that includes both civil and criminal penalties for failing to follow the rules. Industry Specific Laws  Gramm-Leach-Bliley Act (GLBA)  Sarbanes-Oxley Act (SOX)  Payment Card Industry Data Security Standard (PCI DSS)  Import/Export Encryption Restrictions Security Breach Notification Laws  Electronic Communications Privacy Act (ECPA)  Computer Fraud and Abuse Act (1986)
  • 15.
    Presentation ID 15©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Understanding the Ethics of Working in Cybersecurity Cyber Laws and Liability (Cont.) Protecting Privacy  Privacy Act of 1974  Freedom of Information ACT (FOIA)  Family Education Records and Privacy Act (FERPA)  U.S. Computer Fraud and Abuse Act (CFAA)  U.S. Children’s Online Privacy Protection Act (COPPA)  U.S. Children’s Internet Protection Act (CIPA)  Video Privacy Protection Act (VPPA)  Health Insurance Portability & Accountability Act  California Senate Bill 1386 (SB 1386) International Laws  Convention on Cybercrime  Electronic Privacy Information Center (EPIC)
  • 16.
    Presentation ID 16©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cybersecurity Information Websites National Vulnerability Database (NVD) - is a U.S. government repository of standards-based vulnerability management data that uses the Security Content Automation Protocol (SCAP). CERT - The Software Engineering Institute (SEI) at Carnegie Mellon University helps government and industry organizations to develop, operate, and maintain software systems that are innovative, affordable, and trustworthy. It is a Federally Funded Research and Development Center sponsored by the U.S. Department of Defense. Internet Storm Center - provides a free analysis and warning service to Internet users and organizations. It also works with Internet Service Providers to combat malicious cyber criminals. The Internet Storm Center gathers millions of log entries from intrusion detection systems every day using sensors covering 500,000 IP addresses in over 50 countries. The Advanced Cyber Security Center (ACSC) - is a non-profit organization that brings together industry, academia, and government to address advanced cyber threats. The organization shares information on cyber threats, engages in cybersecurity research and development, and creates education programs to promote the cybersecurity profession.
  • 17.
    Presentation ID 17©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cybersecurity Weapons Vulnerability Scanners - assess computers, computer systems, networks, or applications for weaknesses. Vulnerability scanners help to automate security auditing by scanning the network for security risks and producing a prioritized list to address weaknesses. Penetrating Testing (or pen testing) - is a method of testing the areas of weaknesses in systems by using various malicious techniques. Pen testing is not the same as vulnerability testing. Vulnerability testing just identifies potential problems. Pen testing involves a cybersecurity specialist who hacks a website, network, or server with the organization’s permission to try to gain access to resources without the knowledge of usernames, passwords, or other normal means. Packet Analyzers (or packet sniffers) - intercept and log network traffic. The packet analyzer captures each packet, shows the values of various fields in the packet, and analyzes its content. A sniffer can capture network traffic on both wired and wireless networks. Security Tools - There is no one size fits all when it comes to the best security tools. Much depends on the situation, circumstance, and personal preference. A cybersecurity specialist must know where to go to get sound information.
  • 18.
    © 2008 CiscoSystems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18 8.3 Next Step
  • 19.
    Presentation ID 19©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Next Step Exploring the Cybersecurity Profession Defining the Roles of Cybersecurity Professionals The ISO standard defines the role of cybersecurity professionals. The ISO 27000 framework requires:  A senior manager responsible for IT and ISM (often the audit sponsor)  Information security professionals and security administrators  Site/physical security manager and facilities contacts  HR contact for HR matters such as disciplinary action and training  Systems and network managers, security architects and other IT professionals Job Search Tools A variety of websites and mobile applications advertise information technology jobs. Each site targets varying job applicants and provides different tools for candidates researching their ideal job position:  Indeed.com  CareerBuilder.com  USAJobs.gov
  • 20.
    Presentation ID 20©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 21.
    Presentation ID 21©2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential