Download Cybersecurity Handbook 2021
Total Page:16
File Type:pdf, Size:1020Kb
The Cyber Security Handbook Acknowledgements The development of this handbook involved the help of many people. The Ministry of Communications and Information Technology (MCIT) would like to express its gratitude to all those who answered questions about their needs and experiences in the cyber security domain in Samoa – this information helped us to establish the structure of this handbook. Thank you to members of the cross-Government ICT Technical Working Group (ICT-TWG) who reviewed early drafts of the handbook, particularly Mr Suetena Loia. Thank you to the Senior Management Team of the MCIT who guided the writer to make the handbook relevant and practical. We extend a special Pacific thank you to Mr Tony Willenberg for writing the handbook, Prof. Peter Blunt for his constructive comments and editing, and the Department for Foreign Affairs and Trade (DFAT, Government of Australia), through the Samoa Technical Assistance Facility (STAF), whose funding and continued technical support made this handbook possible. 3 The Cyber Security Handbook Table of Contents Copyright ........................................................................................................................................... 2 Acknowledgements ............................................................................................................................ 3 Acronyms .......................................................................................................................................... 5 Introduction........................................................................................................................................ 7 Why this Handbook? ...................................................................................................................................................................... 7 Audience ......................................................................................................................................................................................... 7 Structure .......................................................................................................................................................................................... 8 Section I: Understanding the Cyber Security ‘Landscape’ ................................................................... 9 What is Cyber Security? ................................................................................................................................................................. 9 Why Do We Need It? .................................................................................................................................................................... 10 What’s the Worst That Can Happen? .......................................................................................................................................... 11 Who Is the Enemy? ...................................................................................................................................................................... 13 Stages of an Attack....................................................................................................................................................................... 13 Types of Capabilities .................................................................................................................................................................... 15 Types of Attack ............................................................................................................................................................................. 15 Not All Hackers Are Enemies ....................................................................................................................................................... 16 Section II: Designing the Cyber Security Framework ........................................................................ 17 Assemble the Framework ............................................................................................................................................................. 17 1. Know the Applicable Laws and Regulations ..................................................................................................................... 17 2. Apply International Standards ............................................................................................................................................ 17 3. Take Account of National Frameworks (if any) ................................................................................................................. 18 4. Take Account of Sector Frameworks (if any) .................................................................................................................... 18 5. Identify Risks Relevant to the Organisation ...................................................................................................................... 19 6. Determine the Scope .......................................................................................................................................................... 19 7. Understand the Essential Design Principles ..................................................................................................................... 21 8. Communicate the Policy..................................................................................................................................................... 27 Section III: Implementing the Framework ......................................................................................... 28 Implementing the Core Functions ................................................................................................................................................ 28 1. Identify................................................................................................................................................................................. 28 2. Protect ................................................................................................................................................................................. 29 3. Detect .................................................................................................................................................................................. 31 4. Respond .............................................................................................................................................................................. 32 5. Recover ............................................................................................................................................................................... 32 Annexes .......................................................................................................................................... 33 Annex A: The Three States of Digital Data ................................................................................................................................ 34 Annex B: The Triad of Security Services ................................................................................................................................... 36 Annex C: What is a Resource? .................................................................................................................................................. 37 Annex D: Definition of Terms ...................................................................................................................................................... 38 Annex E: Threat Taxonomy ........................................................................................................................................................ 42 Annex F: Tools and Toolsets ..................................................................................................................................................... 47 Annex G: Sample Cyber Security Protocol ................................................................................................................................ 48 Annex H: Microsoft Active Directory ........................................................................................................................................... 49 Annex I: Resources for IT DR/BC Planning ............................................................................................................................. 50 Annex J: Examples of the CIS Controls, Measures, and Metrics ............................................................................................. 51 References ...................................................................................................................................... 52 4 The Cyber Security Handbook Acronyms ACL Access Control Lists ALCOA Attributable, Legible, Contemporaneous, Original, Accurate APT Advanced Persistent Threats BCP Business Continuity Plan BeEF Browser Exploitation Framework CIA Confidentiality, Integrity, Availability CIRT Computer Incident Response Team CIS Centre for Internet Security CME CrackMapExec CNI Critical National Infrastructure CNIP Critical National Infrastructure Protection CPTED Crime Prevention Through Environment Design CSF Cyber Security Framework CWI Centrum Wiskunde and Informatica DDoS Distributed Denial of Service DFAT Department of Foreign Affairs and Trade DMZ De-Militarised Zone DR/BC Disaster Recovery / Business Continuity DRP Disaster