Skip to main content
Advanced Security Concepts
  1. Resources/
  2. Study Materials/
  3. Information & Communication Technology Engineering/
  4. ICT Semester 5/
  5. Cyber Security (4353204)/
  6. Cyber Security Slidev Presentations/

Advanced Security Concepts

·
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Advanced Security Concepts
#

Unit I: Introduction to Cyber Security & Cryptography
#

Lecture 4: Security Policies, Resources & Threat Modeling
#

Course: Cyber Security (4353204) | Semester V | Diploma ICT | Author: Milav Dabgar

layout: default
#

Recap: Previous Lectures
#

Lecture 1: Introduction
#

  • Cyber security definition
  • Digital asset protection
  • Current threat landscape
  • Career opportunities

Lecture 2: CIA Triad
#

  • Confidentiality principles
  • Integrity mechanisms
  • Availability requirements
  • Practical applications

Lecture 3: Terminology
#

  • Key security terms
  • Adversary classification
  • Attack vectors
  • Risk management

๐ŸŽฏ Today’s Learning Objectives
#

  • Design comprehensive security policies
  • Manage system resources effectively
  • Implement threat modeling methodologies
  • Apply vulnerability management lifecycle
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Security Policy Deep Dive
#

๐Ÿ“‹ Policy Hierarchy
#

1. Organizational Policy
#

  • High-level strategic direction
  • Board and executive approved
  • Broad scope and principles
  • Rarely changes

2. Functional Policies
#

  • Specific security areas
  • Department level implementation
  • Detailed requirements
  • Regular updates

3. Technical Standards
#

  • Implementation specifications
  • Technology-focused
  • Measurable criteria
  • Frequent revisions

๐Ÿ—๏ธ Policy Development Process
#

Phase 1: Planning
#

  • Identify business requirements
  • Assess current state
  • Define scope and objectives
  • Assemble development team

Phase 2: Development
#

  • Research best practices
  • Draft policy content
  • Review with stakeholders
  • Incorporate feedback

Phase 3: Implementation
#

  • Approve through governance
  • Communicate to organization
  • Train affected personnel
  • Monitor compliance
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Essential Security Policies
#

๐Ÿ” Core Security Policies
#

Information Security Policy
#

  • Data classification standards
  • Access control requirements
  • Incident response procedures
  • Employee responsibilities

Acceptable Use Policy
#

  • Authorized system usage
  • Prohibited activities
  • Personal device guidelines
  • Internet and email usage

Access Control Policy
#

  • User provisioning process
  • Role-based permissions
  • Regular access reviews
  • Termination procedures

๐Ÿ“ฑ Technology-Specific Policies
#

Mobile Device Policy
#

  • BYOD requirements
  • Device encryption standards
  • App installation restrictions
  • Remote wipe capabilities

Cloud Security Policy
#

  • Approved cloud services
  • Data residency requirements
  • Shared responsibility model
  • Vendor assessment process

Network Security Policy
#

  • Firewall configurations
  • Wireless network standards
  • VPN usage requirements
  • Network monitoring protocols
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Policy Enforcement & Compliance
#

๐ŸŽฏ Enforcement Mechanisms
#

Technical Controls
#

  • Automated policy enforcement
  • System configurations
  • Access restrictions
  • Monitoring and alerting

Administrative Controls
#

  • Training and awareness
  • Regular audits
  • Performance reviews
  • Disciplinary procedures

Physical Controls
#

  • Facility access restrictions
  • Equipment protection
  • Environmental controls
  • Visitor management

๐Ÿ“Š Compliance Monitoring
#

Key Performance Indicators
#

  • Policy violation incidents
  • Training completion rates
  • Audit findings resolution
  • Risk assessment results

Reporting Structure
#

graph TB
    A[Daily Reports] --> B[Weekly Summaries]
    B --> C[Monthly Dashboards]
    C --> D[Quarterly Reviews]
    D --> E[Annual Assessments]
    
    style A fill:#e3f2fd
    style B fill:#f3e5f5
    style C fill:#e8f5e8
    style D fill:#fff3e0
    style E fill:#fce4ec
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

System Resource Management
#

๐Ÿ’Ž Asset Classification Framework
#

Critical Assets
#

  • Mission-essential systems
  • High business impact
  • Maximum protection required
  • Immediate response priority

Important Assets
#

  • Significant business value
  • Moderate impact if compromised
  • Standard protection measures
  • Planned response procedures

Standard Assets
#

  • Regular business operations
  • Limited impact potential
  • Basic protection sufficient
  • Standard response timeframes

๐Ÿ” Asset Inventory Process
#

Discovery Methods
#

  • Network scanning tools
  • Agent-based collection
  • Manual documentation
  • Integration with CMDB

Asset Attributes
#

  • Technical: OS, versions, configs
  • Business: Owner, criticality, location
  • Security: Vulnerabilities, controls
  • Lifecycle: Purchase, support, EOL

Maintenance Tasks
#

  • Regular inventory updates
  • Automated discovery scans
  • Change management integration
  • Retirement procedures
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Threat Modeling Fundamentals
#

๐ŸŽฏ What is Threat Modeling?
#

Threat modeling is a systematic approach to identifying, analyzing, and mitigating security threats to applications, systems, or networks.

Core Objectives
#

  • Identify potential threats
  • Understand attack vectors
  • Prioritize security risks
  • Design effective countermeasures

When to Apply
#

  • System design phase
  • Architecture reviews
  • Security assessments
  • Incident investigations

๐Ÿ“‹ Threat Modeling Process
#

Step 1: Define Scope
#

  • System boundaries
  • Assets to protect
  • Assumptions and constraints
  • Success criteria

Step 2: Create Models
#

  • Data flow diagrams
  • System architecture
  • Trust boundaries
  • Entry/exit points

Step 3: Identify Threats
#

  • STRIDE methodology
  • Attack trees
  • Threat libraries
  • Expert brainstorming
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

STRIDE Threat Model
#

๐Ÿท๏ธ STRIDE Categories
#

S - Spoofing
#

  • Definition: Pretending to be someone else
  • Examples: Fake certificates, IP spoofing
  • Countermeasures: Authentication, digital signatures

T - Tampering
#

  • Definition: Modifying data or code
  • Examples: File modification, packet alteration
  • Countermeasures: Integrity checks, digital signatures

R - Repudiation
#

  • Definition: Denying performed actions
  • Examples: Claiming actions weren’t performed
  • Countermeasures: Audit logs, digital signatures

I - Information Disclosure
#

  • Definition: Exposing protected information
  • Examples: Data leaks, eavesdropping
  • Countermeasures: Encryption, access controls

D - Denial of Service
#

  • Definition: Making systems unavailable
  • Examples: DDoS attacks, resource exhaustion
  • Countermeasures: Load balancing, rate limiting

E - Elevation of Privilege
#

  • Definition: Gaining unauthorized access levels
  • Examples: Buffer overflows, privilege escalation
  • Countermeasures: Input validation, least privilege
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Attack Trees & Modeling
#

๐ŸŒณ Attack Tree Concepts
#

Attack trees are hierarchical diagrams showing how security attacks can be decomposed into sub-attacks.

Structure Components
#

  • Root node: Primary attack goal
  • Sub-goals: Ways to achieve parent goal
  • Leaf nodes: Basic attack steps
  • AND/OR logic: Relationship types

Benefits
#

  • Visual representation of threats
  • Systematic attack analysis
  • Risk quantification support
  • Communication tool for stakeholders

๐Ÿ“Š Example: Web Application Attack
#

graph TD
    A[Compromise Web App] --> B[Exploit Authentication]
    A --> C[Exploit Authorization]
    A --> D[Exploit Input Validation]
    
    B --> B1[Brute Force]
    B --> B2[Credential Theft]
    B --> B3[Session Hijacking]
    
    C --> C1[Privilege Escalation]
    C --> C2[Access Control Bypass]
    
    D --> D1[SQL Injection]
    D --> D2[XSS Attack]
    D --> D3[Buffer Overflow]

Analysis Questions
#

  • Which paths are most likely?
  • What are the costs/skills required?
  • Which countermeasures are most effective?
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Vulnerability Management Lifecycle
#

๐Ÿ”„ Lifecycle Phases
#

1. Discovery
#

  • Vulnerability scanning
  • Penetration testing
  • Code reviews
  • Threat intelligence

2. Assessment
#

  • Risk evaluation
  • Impact analysis
  • Exploitability assessment
  • Business context

3. Prioritization
#

  • CVSS scoring
  • Business criticality
  • Threat likelihood
  • Available exploits

4. Remediation
#

  • Patch deployment
  • Configuration changes
  • Compensating controls
  • System isolation

5. Verification
#

  • Patch validation
  • Re-scanning
  • Penetration testing
  • Control effectiveness

6. Monitoring
#

  • Continuous scanning
  • Threat monitoring
  • Metrics tracking
  • Process improvement
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Risk Assessment Methodologies
#

๐Ÿ“Š Quantitative Assessment
#

Components
#

  • Asset Value (AV): Dollar value of asset
  • Exposure Factor (EF): % of asset lost
  • Single Loss Expectancy: AV ร— EF
  • Annual Rate of Occurrence: Frequency
  • Annual Loss Expectancy: SLE ร— ARO

Example Calculation
#

Server Value: $50,000
Fire Risk Exposure: 60%
SLE = $50,000 ร— 0.60 = $30,000
Fire Frequency: 0.1/year
ALE = $30,000 ร— 0.1 = $3,000/year

๐ŸŽฏ Qualitative Assessment
#

Risk Levels
#

  • Critical: Immediate action required
  • High: Address within 30 days
  • Medium: Address within 90 days
  • Low: Address when resources allow

Risk Matrix
#

Impact/LikelihoodLowMediumHigh
High ImpactMediumHighCritical
Medium ImpactLowMediumHigh
Low ImpactLowLowMedium

Advantages
#

  • Easier to understand
  • Faster to complete
  • Less precise data required
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Security Governance Framework
#

๐Ÿ›๏ธ Governance Structure
#

Board Level
#

  • Strategic oversight
  • Risk appetite setting
  • Resource allocation
  • Performance monitoring

Executive Level
#

  • Policy development
  • Program management
  • Risk management
  • Incident response

Operational Level
#

  • Daily operations
  • Technical implementation
  • Monitoring and reporting
  • User support

๐Ÿ“‹ Key Governance Processes
#

Risk Management
#

  • Risk identification
  • Risk assessment
  • Risk treatment
  • Risk monitoring

Compliance Management
#

  • Regulatory mapping
  • Control implementation
  • Audit coordination
  • Remediation tracking

Performance Management
#

  • KPI development
  • Metrics collection
  • Trend analysis
  • Improvement planning
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Practical Exercise: Security Policy Design
#

๐ŸŽฏ Group Activity (15 minutes)
#

Scenario: Remote Work Policy
#

Your organization is implementing a permanent remote work policy post-pandemic.

Your Team’s Task:
#

  1. Identify key security concerns for remote work

  2. Design policy sections covering:

    • Device requirements
    • Network security
    • Data protection
    • Incident reporting
  3. Define enforcement mechanisms

  4. Create compliance metrics

Deliverable:
#

Present a 2-minute summary of your policy framework

Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Implementation Challenges
#

โš ๏ธ Common Challenges
#

Policy Development
#

  • Competing priorities
  • Resource constraints
  • Stakeholder alignment
  • Technical complexity

Implementation
#

  • User resistance
  • Technology limitations
  • Process integration
  • Change management

Maintenance
#

  • Regular updates
  • Compliance monitoring
  • Performance measurement
  • Continuous improvement

โœ… Success Factors
#

Leadership Support
#

  • Executive sponsorship
  • Clear communication
  • Resource allocation
  • Cultural change

Stakeholder Engagement
#

  • Early involvement
  • Regular communication
  • Feedback incorporation
  • Training provision

Technology Integration
#

  • Automation opportunities
  • Tool consolidation
  • Process streamlining
  • Monitoring capabilities
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Measuring Security Effectiveness
#

๐Ÿ“Š Security Metrics Categories
#

Leading Indicators
#

  • Training completion rates
  • Vulnerability scan frequency
  • Patch deployment time
  • Security awareness levels

Lagging Indicators
#

  • Security incidents count
  • Data breach impact
  • Audit findings
  • Compliance violations

Operational Metrics
#

  • Mean time to detection (MTTD)
  • Mean time to response (MTTR)
  • False positive rates
  • System availability

๐ŸŽฏ Metric Development Process
#

Step 1: Define Objectives
#

  • Business alignment
  • Stakeholder needs
  • Success criteria
  • Baseline establishment

Step 2: Select Metrics
#

  • Relevance to objectives
  • Data availability
  • Collection feasibility
  • Actionability

Step 3: Implement Collection
#

  • Automated data gathering
  • Standardized reporting
  • Quality assurance
  • Regular reviews
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: default
#

Next Lecture Preview
#

๐Ÿ”œ Lecture 5: OSI Security Architecture - Part 1
#

๐ŸŽฏ Focus Topics:
#

  • OSI model layers overview
  • Security attacks at different layers
  • Layer-specific vulnerabilities
  • Attack classification methods

๐Ÿ“ Preparation:
#

  • Review OSI 7-layer model
  • Research layer-specific security issues
  • Think about network protocols you use daily

๐ŸŽ“ Key Takeaways Today
#

Security Management Foundations
#

  • Policies provide governance framework
  • Asset management enables protection prioritization
  • Threat modeling identifies security gaps
  • Vulnerability management reduces risk exposure

Practice Application
#

  • Develop comprehensive policies
  • Implement systematic asset management
  • Apply threat modeling techniques
  • Establish vulnerability management processes
Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: center class: text-center
#

Questions & Discussion
#

๐Ÿค” Discussion Points:
#

  • Which policy areas are most challenging to implement?
  • How do you balance security with business needs?
  • What are the biggest asset management challenges?

๐Ÿ’ก Exercise Results
#

Share your remote work policy frameworks

Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar

layout: center class: text-center
#

Thank You!
#

Next Lecture: OSI Security Architecture - Part 1
#

Understanding Security at Every Network Layer
#

Cyber Security (4353204) - Lecture 4 Complete

Security by design, not by accident! ๐Ÿ—๏ธ๐Ÿ”’

Course: Cyber Security (4353204) | Unit I | Lecture 4 | Author: Milav Dabgar