New to Z

New to IBM Z

Deepen your technical skills, expand your global network, and connect with mentors and other early tenure professionals on the mainframe platform.

 View Only
  • 1.  The 'Essential' Security Terminology

    Posted Tue October 01, 2024 03:20 AM
    Edited by Niall Ashley Tue October 01, 2024 04:34 AM

    Foreword

    As we enter Cyber Security Awareness Month (CSAM),  I wanted to ensure that people are aware of some of the 'core' security concepts.

    Over the course of CSAM, I will be writing posts about aspects of cybersecurity / mainframe-security.

    In today's post, I shall outline what the "Circle of risk" is and explain related terminology.

    |

    The Circle of Risk

    In its simplest form, the circle contains seven interconnected terms.

    Diagram showing seven security terms that are connected together by a circle

    The seven phrases on this diagram are as follows:

    Asset,   Threat,   Threat Agent  Attacks,   Vulnerability,   Risk,   Countermeasures / Correctives

    |

    Defining the Terminology

    We shall define the aforementioned terms below:

    Asset  -  This is something of value to a business, that requires protection.

    This may include anything from a computer file, intellectual property, hardware devices, right through to company employees.

    Assets these may be compromised by …

    Threat  -  This is something that could result in the damage, destruction, alteration or loss of an asset.

    These may be malicious in nature, they could be accidental, or could be something else like an earthquake or other natural disaster.

    Threats may be perpetrated by a …

    Threat Agent  -  This is a person/system that means harm to an asset, sometimes referred to as a 'hacker'.

    Examples of this may include a person who directly hacks into a bank, or a system they may use to cause a DDOS attack.

    Threat Agents may carry out an …

    Attacks  -  This is the damage, destruction, alteration or theft of assets.

    As mentioned previously, this 'attack' could be malicious, but it could also be accidental (e.g. spilling water on your laptop).

    Malicious attacks often follow the exploitation of a …

    Vulnerability  -  This is a weakness or absence of a safeguard/countermeasure, which threat agents will attempt to exploit.

    Areas of vulnerability could be because of a flaw in programming (e.g. Zero Day Exploits) or because of something else (e.g. Social Engineering).

    Vulnerabilities are often exposed to …

    Risk  -  This is the possibilities of something bad happening, whether accidental or malicious.

    Risks can be mitigated by …

    Countermeasures / Correctives  -  These are methods of control.

    Countermeasures will generally come in three main forms:

     -> Physical (Barrier Gates, Security Doors, Fences, RFID Locks, CCTV cameras, etc…)

     -> Administrative (policies, procedures and principles)

     -> Technical Protections  (zSecure Alerts,  Command Verifier,  UACC=NONE,  PROTECTALL=YES/FAIL,  SETROPTS password rules,  etc…)

    Countermeasures will help in protecting the … (circle returns to Assets)

    |

    Further Content

    Later today (1st October) I will be delivering a session with @Henri Kuiper as part of IBM Z Day!

    https://ibmzday2024-vconf.bemyapp.com/#/talks/66edf9644080f4c3936490e1

    Over the following weeks, I will also be uploading further content about aspects of cybersecurity / mainframe-security.

    If you are interested in reading more, I am uploading three articles on Security in October and I will be publishing further articles throughout November.

    So far, I plan to cover the following topics:

    • "Cybersecurity 101:  Resilience for the Uninitiated."
    • "What's a 'Cyber Kill Chain' and why should I care?"
    • "Who are your cyber threats?  Knowing your Keyser Söze"
    • "The value of data:  What have you got to lose?"

    If you wish to stay informed of these uploads, please feel free to follow me or connect with me on LinkedIn :)

    https://www.linkedin.com/in/niall-ashley-a91914124/


    ------------------------------
    Niall Ashley (he/him)
    Consultant in Mainframe Security (RACF)
    Vertali Ltd
    ------------------------------



  • 2.  RE: The 'Essential' Security Terminology

    Posted Thu October 03, 2024 08:06 AM

    Thanks this article is great, can't wait for the next ones! I also thoroughly enjoyed your session and recommend watching the reply to anyone who missed it



    ------------------------------
    Ruth Bonser
    ------------------------------



  • 3.  RE: The 'Essential' Security Terminology

    Posted Tue October 08, 2024 08:52 AM

    Thank you so much Ruth!  I really admire your contributions, so this is high praise 😊



    ------------------------------
    Niall Ashley (he/him)
    Consultant in Mainframe Security (RACF)
    Vertali Ltd
    ------------------------------



  • 4.  RE: The 'Essential' Security Terminology

    Posted Tue October 08, 2024 08:55 AM

    Just in case anyone missed my session, here's a link to the replay:  https://ibmzday2024-vconf.bemyapp.com/#/talks/66edf9644080f4c3936490e1

    And if you you are interested in minimising risk to your business, try following the practices below 👍

    What can we do to keep mitigate risks?

    In order to keep systems secure, it is worth following practices:

    Hide sensitive materials to prevent data from being leaked or manipulated.

    Restrict users to only have what they need, only for as long as they need it.

    Keep systems up-to-date with patches installed to fix any vulnerabilities and prevent exploits.

    Avoid clicking on suspect links, downloading files from untrusted websites, or inserting suspect USB sticks / CDs or even peripherals to your devices.

    Keep an eye out for suspicious activity and remain vigilant in escalating this.

    Maintain event-logs, audit trails, and activity-monitoring so discrepancies can be tracked.

    Regularly undergo pen testing and vulnerability assessments, using staff who can 'think like a threat agent' to predict the agent's ultimate goal, so you can then implement preventions.



    ------------------------------
    Niall Ashley (he/him)
    Consultant in Mainframe Security (RACF)
    Vertali Ltd
    ------------------------------