Files
uni/year4/semester2/CT437/notes/CT437.tex

157 lines
6.1 KiB
TeX

% ! TeX program = lualatex
\documentclass[a4paper,11pt]{article}
% packages
\usepackage{censor}
\StopCensoring
\usepackage{fontspec}
\setmainfont{EB Garamond}
% for tironian et fallback
% % \directlua{luaotfload.add_fallback
% % ("emojifallback",
% % {"Noto Serif:mode=harf"}
% % )}
% % \setmainfont{EB Garamond}[RawFeature={fallback=emojifallback}]
\setmonofont[Scale=MatchLowercase]{Deja Vu Sans Mono}
\usepackage[a4paper,left=2cm,right=2cm,top=\dimexpr15mm+1.5\baselineskip,bottom=2cm]{geometry}
\setlength{\parindent}{0pt}
\usepackage{fancyhdr} % Headers and footers
\fancyhead[R]{\normalfont \leftmark}
\fancyhead[L]{}
\pagestyle{fancy}
\usepackage{microtype} % Slightly tweak font spacing for aesthetics
\usepackage[english]{babel} % Language hyphenation and typographical rules
\usepackage{xcolor}
\definecolor{linkblue}{RGB}{0, 64, 128}
\usepackage[final, colorlinks = false, urlcolor = linkblue]{hyperref}
% \newcommand{\secref}[1]{\textbf{§~\nameref{#1}}}
\newcommand{\secref}[1]{\textbf{§\ref{#1}~\nameref{#1}}}
\usepackage{changepage} % adjust margins on the fly
\usepackage{amsmath,amssymb}
\usepackage{minted}
\usemintedstyle{algol_nu}
\usepackage{pgfplots}
\pgfplotsset{width=\textwidth,compat=1.9}
\usepackage{caption}
\newenvironment{code}{\captionsetup{type=listing}}{}
\captionsetup[listing]{skip=0pt}
\setlength{\abovecaptionskip}{5pt}
\setlength{\belowcaptionskip}{5pt}
\usepackage[yyyymmdd]{datetime}
\renewcommand{\dateseparator}{--}
\usepackage{enumitem}
\usepackage{titlesec}
\author{Andrew Hayes}
\begin{document}
\begin{titlepage}
\begin{center}
\hrule
\vspace*{0.6cm}
\Huge \textsc{ct437}
\vspace*{0.6cm}
\hrule
\LARGE
\vspace{0.5cm}
Computer Security \& Forensic Computing
\vspace{0.5cm}
\hrule
\vfill
\hrule
\begin{minipage}{0.495\textwidth}
\vspace{0.4em}
\raggedright
\normalsize
\begin{tabular}{@{}l l}
Name: & Andrew Hayes \\
Student ID: & 21321503 \\
E-mail: & \href{mailto://a.hayes18@universityofgalway.ie}{a.hayes18@universityofgalway.ie} \\
\end{tabular}
\end{minipage}
\begin{minipage}{0.495\textwidth}
\raggedleft
\vspace*{0.8cm}
\Large
\today
\vspace*{0.6cm}
\end{minipage}
\medskip\hrule
\end{center}
\end{titlepage}
\pagenumbering{roman}
\newpage
\tableofcontents
\newpage
\setcounter{page}{1}
\pagenumbering{arabic}
\section{Introduction}
\subsection{Lecturer Contact Information}
\begin{itemize}
\item Name: Dr. Michael Schukat.
\item E-mail: \href{mailto://michael.schukat@universityofgalway.ie}{michael.schukat@universityofgalway.ie}.
\item Office: CSB-3002.
\end{itemize}
\subsection{Marking}
\begin{itemize}
\item 2 hours of labs per week from Week 03.
\item 30\% Continuous Assessment consisting of 2 assignments, in-class quizzes, \& lab worksheets.
\item In-class quizzes will be open-book Canvas MCQs consisting of 5 randomised questions out of a pool of 20+ questions.
One question is presented at a time, there is no back-tracking allowed.
5minutes duration.
\item 70\% exam.
\end{itemize}
\subsection{Cybersecurity versus Computer Security}
\textbf{Cybersecurity} is the practice of protecting systems, networks, \& programs from digital attacks.
These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
\\\\
\textbf{Computer security} is a historically older term coined at a time when the focus was on individual stand-alone computers rather than entire systems.
\\\\
\textbf{Computer forensics} is a branch of digital forensic science pertaining to evidence found in computers \& digital storage media.
The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analysing, and presenting facts \& opinions about the digital information.
\subsection{Definitions, Terminology, \& Case Studies}
\textbf{Computer security}, cybersecurity, or information technology security (IT security) is the protection of computer systems \& networks from the theft or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
The protection can be on a personal, organisational, or government level.
Protection from cybercrime of data (from theft or manipulation) and services (from disruption or misuse).
\subsubsection{States of Data}
\begin{itemize}
\item \textbf{Data at rest} refers to data stored in memory or on a permanent storage device such as a hard drive, solid-state drive, or USB drive.
\item \textbf{Data in process} refers to data that is being used to perform an operation such as updating a database record.
\item \textbf{Data in transit} refers to data travelling between information systems, e.g., data transfer over a network via TCP/IP.
\end{itemize}
\subsubsection{How to Provide Protection?}
\begin{itemize}
\item \textbf{Awareness, training, \& education} are the measures put in place by an organisation to ensure that users are knowledgeable about potential security threats and the actions they can take to protect information systems.
\item \textbf{Technology} refers to the software \& hardware-based solutions designed to protection information systems such as firewalls, which continuously monitor your network in search of possible malicious incidents.
\item \textbf{Policy \& procedure} refers to the administration controls that provide a foundation for how an organisation implements information assurance, such as incident response plans \& best practice guidelines.
\end{itemize}
\textbf{Defense in Depth (DiD)} is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect assets.
If one mechanism fails, another one steps up immediately to thwart an attack.
\end{document}