Lesson 3 Cybersecurity Threats and Controls

Cybersecurity Threats

Data Threats

Identity Theft

Online Tracking

Lesson 3 Cybersecurity Threats and Controls

Cookies

Cybersecurity and Access Control

Role-Based Access Control (RBAC)

Attribute-Based Access Control (ABAC)

Identification

Lesson 3 Cybersecurity Threats and Controls

Authentication

Authorization

Nonrepudiation

Principle of Least Privilege

Need to Know

Layering

Diversification

Obscurity

Lesson 3 Cybersecurity Threats and Controls

Auditing and Monitoring

Cybersecurity Access Control Tools

Lesson 3 Cybersecurity Threats and Controls

Single Sign-On (SSO)

Active Directory Example

Lesson 3 Cybersecurity Threats and Controls

Table 1.3: Advantages and potential issues of IAM systems

Attacking an IAM

Lesson 3 Cybersecurity Threats and Controls

Single Sign-On (SSO)

Table 1.4: Advantages and potential issues of SSO authentication

Lesson 3 Cybersecurity Threats and Controls

Assessing and Identifying Vulnerabilities of Systems

Vulnerability Assessment (VA)

Penetration Testing (PT)

Lesson 3 Cybersecurity Threats and Controls

Exploitation

Cybersecurity and Ethical Hacking

Lesson 3 Cybersecurity Threats and Controls

Table 1.5: Main activities performed by security professionals

Lesson 3 Cybersecurity Threats and Controls

Read the sentences and tick True or False.

Analyze the role of data protection in addressing data threat issues in the digital age. What are the key data protection concerns?

Lesson 3 Cybersecurity Threats and Controls

Evaluate the use of cookies in online tracking. How can cookies both enhance user experience and raise privacy concerns?

Analyze the significance of nonrepudiation in access control and cybersecurity.

Lesson 3 Cybersecurity Threats and Controls

Evaluate the principle of least privilege and its impact on access control. How does adhering to this principle reduce security risks within an organization?

Describe the role of ethical hacking in maintaining a strong cybersecurity posture. How does ethical hacking contribute to the overall security of an organization?

Lesson 3 Cybersecurity Threats and Controls

Outline the roles of professionalism and responsibility in ethical hacking.

Evaluate the role of white-hat hackers in conducting security audits and red team exercises.