This Cybersecurity FAQ consists of Frequently Asked Questions related to cybersecurity and related topics. These include, but are not limited to, the following:
Alternative FAQ Phrasings: What is a cybersecurity? | What is cyber security?
Definition: cybersecurity (a.k.a. cyber security, computer network security) refers to the specialization of computer network security that consists of technologies, policies, and procedures that protect networked computer systems from unauthorized use or harm. Broadly speaking, cybersecurity topics can be subdivided into two complementary areas: cyber attacks, which are essentially offensive and emphasize network penetration techniques; and cyber defenses, which are essentially protective and emphasize counter-measures intended to eliminate or mitigate cyber attacks.
Cyber attacks can take aim at the enterprise, government, military, and other infrastructural assets of a nation or its citizens, where these assets can include physical infrastructure (e.g., power grids, nuclear reactors) as well as computational infrastructure (e.g., computers, networks). Cyber attacks can be classified by their participating actors (states vs. non-states) and their attack mechanisms (e.g., direct attack, malware, exploits). See the Cyber Attack Classifications, Cyber Attack Malware Taxonomy, and Cyber Attack Mechanism Taxonomy sub-sections in the Cyber Attacks section for more information.
Correspondingly, cyber defenses must protect the enterprise, government, military, and other infrastructural assets of a nation or its citizens. As is the case with cyber attacks, cyber defenses can be classified by their participating actors (states vs. non-states) and their attack mechanisms (e.g., direct attack, malware, exploits). See the Cyber Defense Classifications and Cyber Defense Countermeasure Taxonomy sub-sections in the Cyber Defenses section for more information.
How to Learn More About Cybersecurity
To learn more about how to specify cybersecurity and related technologies, please see the following Cybersecurity FAQs:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
The increasing reliance of our information-age economies and governments on cyber (computer-based) infrastructure makes them progressively more vulnerable to cyber attacks on our computer systems, networks, and data. In their most disruptive form, cyber attacks target the enterprise, government, military, or other infrastructural assets of a nation or its citizens. Both the volume and sophistication of cyber threats (cyber warfare, cyber terrorism, cyber espionage and malicious hacking) are monotonically increasing, and pose potent threats to our enterprise, government, military, or other infrastructural assets. Knowing that to be forewarned is to be forearmed, we are well advised to effect strong Cybersecurity defenses that will thwart rapidly evolving cyber threats.
Recent newsworthy cyber attacks on critical cyber infrastructure (e.g., Target data breach, Mt. Gox bitcoin hacker attacks, NSA data leaks and subsequent PRISM revelations) demonstrate the urgent need for improved cybersecurity. As cyber threats grow, so must our abilities to neutralize them. Towards that end, the U.S. government issued an Executive Order for Improving Critical Infrastructure Cybersecurity in February 2013, and the 2014 President's Budget devoted over $13B to cyber-related programs and activities [Federal Information Technology FY 2014 Budget Priorities, p. 15]. The European Union Agency for Network and Information Security (ENISA) lists all known public documents of National Cyber Security Strategies in the EU, as well as the rest of the world.
Cyber attack: An offensive action by a malicious actor that is intended to undermine the functions of networked computers and their related resources, including unauthorized access, unapproved changes, and malicious destruction. Examples of cyber attacks include Distributed Denial of Service (DDoS) and Man-in-the-Middle (MITM) attacks.
cyber threat: A potential cyber attack, which may be assigned a probability of occurrence that can be used for cyber risk assessment.
cyber risk: A risk assessment that has been assigned to a cyber threat, such as DDoS attack or a data breach. A cyber risk assessment may be either qualitative or quantitative, where the latter should estimate risk (R) as a function of the magnitude of the potential loss (L) and the probability that L will occur (i.e., R = p * L).
Classification | Actor | Attack Effect Equivalency |
---|---|---|
Cyber Attack [generic] | TBD | TBD |
Cyber Warfare [includes Cyber Espionage, Cyber Sabotage] | State [nation] | war act |
Cyber Crime | Non-State (individual/organization) | criminal act |
Cyber Terrorism | Non-State (individual/organization) | terrorism act |
Malware is an umbrella term derived from "malicious software", and refers to any software that is intrusive (unauthorized access), disruptive, or destructive to computer systems and networks. Malware may take many forms (executable code, data files) and includes, but is not limited to, computer viruses, worms, trojan horses (trojans), bots (botnets), spyware (system monitors, adware, tracking cookies), rogueware (scareware, ransomware), and other malicious programs. The majority of active malware threats are usually worms or trojans rather than viruses.
The following table summarizes the similarities and differences among selected common malware types.
Malware Type | Requires Host File to Infect? | Self-Spreading? | Appears legitimate (harmless)? | Can Carry Harmful Payload? | Can Commo with Command & Control Server? | Can Attack OS Kernel & Firmware? |
---|---|---|---|---|---|---|
Virus | | | N/A | | N/A | |
Worm | | | N/A | | N/A | |
Trojan | | | | | N/A | |
Bots/Botnet | N/A | N/A | N/A | | | |
Spyware | | | N/A | | | |
Rootkit | N/A | N/A | N/A | | N/A | |
For more information about the various kinds of malware, check out the Malware Taxonomy comparison table on the Cyber Attacks page.
Alternative FAQ Phrasings: What is a cyber hygiene? | What is cybersecurity hygiene? | What is cyber security hygiene?
Definition: cyber hygiene (a.k.a., cybersecurity hygiene, cyber security hygiene) is a colloquial term that refers to best practices and other activities that computer system administrators and users can undertake to improve their cybersecurity while engaging in common online activities, such as web browsing, emailing, texting, etc.
Etymology
The term cyber hygiene was coined by Vinton Cerf, an Internet pioneer, who used the expression in his statement to the United States Congress Joint Economic Committee on 23 February 2000, where boldface is added for emphasis:
It is my judgment that the Internet itself is for the most part secure, though there are steps we know can be take to improve security and resilience. Most of the vulnerabilities arise from those who use the Internet--companies, governments, academic institutions, and individuals alike--but who do not practice what I refer to as good cyber hygiene. They are not sufficiently sensitive to the need to protect the security of the Internet community of which they are a part. The openness of the Internet is both its blessing and its curse when it comes to security.
Cyber Hygiene Best Practices
Cyber hygiene related best practices for computer network/system administrators include, but are not limited to:
Cyber hygiene related best practices for computer system users include, but are not limited to, using strong passwords and 2FA/MFA, avoiding accessing cybersecure systems on unauthorized and/or non-secure BYODs (Bring Your Own Devices), and avoiding mixing personal with cybersecure email and/or work documents.
For more information about Recommended Best Practices for Cyber Hygiene - Top 10, see the CyberSecurity FAQ - What are the best practices for cyber hygiene?.
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
RECOMMENDED BEST PRACTICES FOR CYBER HYGIENE - TOP 10
The best practices for effective cyber hygiene should include and extend the following:
Protect your computer network with secure routers with robust firewalls. While traveling, use a Virtual Private Network (VPN) and/or software firewall.
The 1st line of cyber defense in computer network security is to install and maintain a secure Internet Protocol (IP) router and a robust firewall that prevents unauthorized users from accessing data, email, applications, web browsers, etc. If you are a computer system administrator: install and configure a secure commerical IP router, white list all approved users, black list all unknown users, and ensure that the wireless (WiFi) communications use WPA2/WPA3 encryption for wireless comunications. If you are a home computer user, check out the Home Broadband Routers section of the LifeWire What Is a Router for Computer Networks? article. If you are traveling away from your business or home computer network, ensure that you are using a secure Virtual Private Network (VPN) and/or your Operating System (OS) has a secure software firewall turned on.
Install dependable anti-virus (AV) and anti-malware software that continuously scans your computer/mobile phone, and update it frequently
The 2nd line of cyber defense in computer network security is to install and maintain robust anti-virus (AV) and anti-malware software that scans and terminates computer viruses and other kinds of malicious sofware (malware). If you are a computer system administrator install a robust commericial Intrusion Protection Device/Intrusion Protection Device product; if you are a home computer user ensure that you install either a commercial or FOSS (Free & Open Source Software) AV software product.
Update all OS, Web Browser and Application software with security patches in a timely manner.
The 3rd line of cyber defense in computer network security is to update all Operating System (OS), web browser, and application software regularly to ensure that security patches are properly installed in a timely manner. These security patches are essential to make sure that all currently-known cybersecurity vulnerabilities have been closed.
Keep your user data separate from applications, and apply strong encryption to all sensitive and confidential data
Keep all user data separate from user applications, and keep personal data separate from business data. Apply strong encryption (AES-256 bit or higher) with strong passwords (see #4 above) to all sensive and confidential data including, but not limited to, financial and health data.
Keep your user data separate from applications, and back up data regularly
Keep all user data separate from user applications (see #6 above) and back up data to another network node (computer or server) frequently (weekly if not daily), and offsite (cloud-based and/or bank deposit box) regularly (monthly if not bi-weekly).
When selling and disposing of computers and storage devices securely erase all persistent storage.
When selling or disposing of your desktop, laptop, tablet, smartphone or USB drive, it’s critical that you securely wipe (erase) all personal, sensitive and confidential data. Deleting files alone is insufficient, since they frequently can be recovered by hackers and forensic specialists. Conequently, you should securely erase as explained in the following PC World article How to securely erase your hard drive. Check out Scientific American's How to Destroy a Hard Drive—Permanently article.
Keep in mind that, like human hygiene, you need to practice cyber hygiene on a regular, systematic basis for it to be effective. Don't worry above implementing all ten of the best practices listed above immediately; you will be better served by implementing them incrementally and opportunistically as you become more cyber WOK (aware)!
If you have constructive recommendations to correct, clarify or otherwise improve this or any other Cybersecurity FAQ please contact us.
Although most people understand what spamware is without a formal definition, the most common malware types (viruses, worms, trojans, and bots) are frequently confused by computer experts (who are not cybersecurity experts) and computer noobs like.
The following table summarizes the similarities and differences among viruses, worms, trojans, and bots.
Malware Type | Requires Host File to Infect? | Self-Spreading? | Appears legitimate (harmless)? | Can Carry Harmful Payload? | Can Commo with Command & Control Server? | Can Attack OS Kernel & Firmware? |
---|---|---|---|---|---|---|
Virus | | | N/A | | N/A | |
Worm | | | N/A | | N/A | |
Trojan | | | | | N/A | |
Bots/Botnet | N/A | N/A | N/A | | | |
Spyware | | | N/A | | | |
Rootkit | N/A | N/A | N/A | | N/A | |
For more information about the various kinds of malware, check out the Cyber Attack Mechanism Taxonomy on the Cyber Attacks page.
Alternative FAQ Phrasings: What is a cybersecurity architecture? | What is a cyber security architecture? | What is a network security architecture? | What is a cyber architecture?
Definition: cybersecurity architecture (a.k.a. cyber security architecture, network security architecture, or cyber architecture for short) specifies the organizational structure, functional behavior, standards, and policies of a computer network that includes both network and security features. The collective features of a cybersecurity architecture include, but are not limited to, the following:
Network Elements
- network nodes (computers, NICs, repeaters, hubs, bridges, switches, routers, modems, gateways, etc.)
- network communication protocols (TCP/IP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP, etc.)
- network connections between nodes using specific protocols
- network topologies among nodes (point-to-point, bus, star, ring or circular, mesh, tree, daisy chain, hybrid)
Security Elements
- cybersecurity devices (firewalls, Intrusion Detection/Protection Systems [IDS/IPS], encryption/decryption devices, etc.)
- cybersecurity software (Anti-Virus (AV) software, spamware software, anti-malware software, etc.)
- secure network communication protocols (TCP/IP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP, etc.)
- strong encryption techniques (end-to-end encryption, zero-knowledge privacy, blockchain, etc.)
Security Frameworks & Standards
- cybersecurity framework standards (NIST Risk Management Framework (RMF) SP 800-37, DoD Instruction 8510.01, ISO IEC 27000-Series)
- technology standards for cybersecurity software choices
Security Policies & Procedures
- security policies and procedures that are customized and enforced for your organization and/or project.
Ideally, a cybersecurity architecture should be definable and simulatable using an industry-standard architecture modeling language (e.g., SysML, UML2).
It is sometimes useful to consider a cybersecurity architecture to be a specialization of computer network architecture that emphasizes security features and capabilities. To learn more about the differences between cybersecurity architecture and network architecture, please see the following Cybersecurity FAQ:
To learn more about the purpose of a cybersecurity architecture, please see the following Cybersecurity FAQ:
HOW TO SPECIFY A CYBERSECURITY ARCHITECTURE
To learn more about how to specify cybersecurity architectures, please see the following Cybersecurity FAQs:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
The purpose of precisely and comprehensively specifying a cybersecurity architecture is to ensure that the underlying network architecture, including its crown jewel sensitive data and critical applications, are fully protected against current and future cyber adversaries. Just as a competent military commander needs to fully understand different kinds of terrain (Sun Tzu, Art of War, Chapter 10: Terrain) and the weakpoints of his forces (Sun Tzu, Art of War, Chapter 6: Weak Points and Strong) to effectively defend her troops and territory, a savvy cybersecurity architect needs to thoroughly understand different network topologies and cyber attack surface vulnerabilities to effectively defend her crown jewel sensitive data and critical applications.
The primary goals of a bona fide cybersecurity architecture are to ensure that:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ please contact us.
Consider the following defintion of a computer network architecture:
Definition: network architecture (computer network architecture, or net architecture for short) specifies the organizational structure, functional behavior, standards, and policies of a computer network including, but not limited to:
- network nodes (computers, NICs, repeaters, hubs, bridges, switches, routers, modems, gateways, etc.);
- network communication protocols (TCP/IP, DHCP, DNS, FTP, HTTP, HTTPS, IMAP, etc.);
- network connections between nodes using specific protocols;
- network topologies among nodes (point-to-point, bus, star, ring or circular, mesh, tree, daisy chain, hybrid);
- network technology choices;
- network policies and procedures.
Ideally, a network architecture should be definable and simulatable using an industry-standard architecture modeling language (e.g., SysML, UML2).
It is sometimes useful to consider a cybersecurity architecture to be a specialization of computer network architecture that emphasizes security features and capabilities. Stated otherwise, a cybersecurity architecture elements can be considered a superset of a network architecture elements. To see the additional architecture elements that a cybersecurity architecture includes, please compare and contrast the definition of network architect provided above with the cybersecurity architecture definition provided in the following Cybersecurity FAQ:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ please contact us.
Alternative FAQ Phrasings: What is a cybersecurity architect? | What is a cyber security architect? | What is a cyber architect?
Definition: cybersecurity architect (a.k.a., cybersecurity architect, cyber architect, network security architect) is a person who specifies and oversees cybersecurity architectures.
To learn more about cybersecurity architects and what they do, please see the following Cybersecurity FAQs:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
Alternative FAQ Phrasings: How to become a cybersecurity architect? | How to become a cyber security architect? | How to become a cyber architect?
In order to become a professional cybersecurity architect (a.k.a., cybersecurity architect, cyber architect, network security architect), consider the following recommendations for educational, work experience, and certifications:
EDUCATIONAL BACKGROUND
WORK EXPERIENCE
CERTIFICATIONS
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
In order to specify a cybersecurity architecture precisely and completely, you should use a bona fide architecture modeling language (SysML, UML2, CyberML) to define the following kinds of architecture elements:
Network Elements
Security Elements
Security Frameworks & Standards
Security Policies & Procedures
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
When specifying cybersecurity architectures it is useful distinguish among the following kinds of architectural elements:
Network Elements
Security Elements
Security Frameworks & Standards
Security Policies & Procedures
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
CYBERSECURITY ARCHITECTURE & DESIGN RECOMMENDATIONS
Cyber Architecture & Design Modeling Languages: SysML + CyberML
Cyber Architecture & Design Modeling Tools: Sparx Enterprise Architecture (Sparx EA) or MagicDraw/Cameo
Cyber Architecture & Design Patterns: See Essential Cybersecurity Architecture & Design Applied hands-on training workshops
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ please contact us.
Alternative FAQ Phrasings: What is a cryptographic key? | What is an encryption/decryption key? | What is a crypto key?
Definition: cryptography key (a.k.a. encryption/decryption key, or crypto key for short) is an input parameter to a cryptographic algorithm or cipher function, which uniquely encodes plaintext (messages or other information) into ciphertext during encryption, and vice versa during decryption.
To explicate further, consider the following pseudocode for the complementary cryptographic algorithm functions encode and decode with parameters plaintext, cryptokey, and ciphertext:
encode (plaintext: String; cryptokey: String): ciphertext: String
decode (ciphertext: String; cryptokey: String): plaintext: String
The input and output parameters for encode and decode functions are described below:
Note that the cryptographic keys used for for encryption and decryption needn’t be symmetrical (i.e., identical). Indeed, for public-key encryption systems, the cryptographic keys are asymmetrical.
In addition to encryption and decryption algorithms, cryptographic keys can be used for other cryptographic algorithms, such as digital signature schemes and message authentication codes.
To learn more about encryption and decryption cryptography techniques, see the following Cybersecurity FAQs:
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
Public-key encryption is an asymmetrical cryptographic system which uses a pair of mathematically related cryptographic keys:
The cryptographic key pair is mathematically related in the sense that whatever is encrypted via a public key can only be decrypted via a private key, and vice versa. For example, if Chauncey wants to send a confidential message to Chelsea, and wants to ensure that only Chelsea can read it, Chauncey can encrypt the message with Chelsea’s public key. Only Chelsea, or someone with access to her corresponding private key, will be capable of decrypting the encrypted message back into its original unencrypted form. Even if someone intercepts Chelsea’s encrypted message druing transmission, its contents will remain confidential if the interceptor lacks access to Chelsea’s private key, which is essential for decryption.
To explicate further, consider the following pseudocode for the complementary cryptographic algorithm functions encode and decode with parameters plaintext, ciphertext, publickey, and privatekey, where the last two parameters represent a complementary public-private cryptographic key pair:
encode (plaintext: String; publickey: String): ciphertext: String
decode (ciphertext: String; privatekey: String): plaintext: String
The input and output parameters for encode and decode functions are described below:
Alternative FAQ Phrasings: What is Zero-Based Proof (ZBP)? | What is a Zero-Based Proof? | What is Zero-Based Privacy?
Zero-Based Privacy cybersecurity techniques for cybersecurity are based on Zero-Knowledge Proofs (a.k.a. ZK Proofs, or ZKP for short), which are among the most powerful tools cryptographers have ever devised. Zero-Knowledge Proofs are defined as follows:
Definition: Zero-Based Proof (ZK Proof, ZKP; a.k.a. ZBP) is a cryptographic method by which one party (the Prover, P) can prove to another party (the Verifier, V) that P knows information X, without conveying any information to V other than P knows a value X. The insight to understanding Zero-Knowledge Proofs is that while it is trivial to prove that one possesses knowledge of value by simply revealing it, it is relatively challenging to prove possession of such knowledge without revealing either a) the information itself; or b) additional information.
For an intuitive introduction to Zero-Knowledge Proofs without substantial mathematics, see Zero Knowledge Proofs: An illustrated primer.
As a practical application of Zero-Knowledge Proofs, Zero-Knowledge Privacy is defined as follows:
Definition: Zero-Based Privacy is the practical application of Zero-Based Proofs to improve the security of computer servers that store and transmit sensitive/confidential client data (messages, files, database entries, authentication information, cryptographic keys, file metadata). As a general principle, a Zero-Knowledge Privacy server must never be allowed to read or write client data as plaintext (i.e., unencrypted; compare ciphertext or encrypted), including authentication information, cryptographic keys, and file metadata. Consequently, for most practical purposes the confidentiality of the client data on the server cannot be compromised via internal mismanagement (including internal prying eyes) or external agents (e.g., cyber hackers).
While many vendors of data storage claim end-to-end encryption, many fall short of zero knowledge privacy standards because they either read or write client data and authentication information as plaintext sometime during the end-to-end data transmission or storage processes, typically for client convenience. For example, consider the case of a File Synchronization & Sharing Tool user who uploads a local file on her desktop computer to her cloud-based storage server using a web-based interface. While the web-based interface may be convenient to the user, when she enters her authentication information directly into the web-based interface as plaintext, she is compromising the confidentiality of the file she is uploaded, since the cloud-based server can read the unencrypted file along with the associated metadata and authentication information prior to encryption. Consequently, if the cloud-based server is compromised by either an external or internal cyber threat, any encrypted stored data is also potentially compromised.
Compare this with a bona fide Zero-Knowledge Privacy approach, where the user utilizes a dedicated secure app to fully encrypt the file prior to uploading it to the cloud-based server using the SSL (Secure Socket Layer) protocol during transmission, and the secure app provides neither metadata nor unencrypted password information to the cloud-based server.
See Review: Secure Enterprise File Sync & Sharing (EFSS) Services for a comparison of the cybersecurity features of popular file synchronization and sharing tools, some of which provide Zero-Knowledge Privacy.
If you have constructive recommendations to correct, clarify, or otherwise improve this or any other Cybersecurity FAQ, please contact us.
CYBERSECURITY FORUM and CyberSecurityForum.com are trademarks of PivotPoint Technology Corporation. All other product and service names mentioned are the trademarks of their respective companies.