Introduction to the Security Field
Introduction to the Security Field
Da’Queshia opens the course by challenging common images of security—dark rooms of analysts, lab technicians, or guards at doors. All of those roles belong to the wide world of security, a field that protects people, processes, and technology.
She introduces herself as a security engineer at Google, working on Gmail security: developing new features, fixing vulnerabilities, and collaborating with a diverse team that brings many backgrounds to the table.
1. The Building Blocks of Security
Security programs are built on three inter‑related pillars:
- People – the individuals who design, implement, and operate security controls.
- Processes – the policies, standards, and procedures that guide actions.
- Technology (Tools) – the software and hardware that enforce protection.
Understanding how these pillars interact is the foundation of the entire course.
2. Asset Security
2.1 What Is an Asset?
An asset is anything of value to an organization. Examples include:
- Physical items: buildings, doors, windows, equipment.
- Digital items: data, applications, intellectual property.
- People: employees, customers, partners.
2.2 Asset Inventory & Classification
- Asset inventory – a catalog of every asset that must be protected.
- Asset classification – labeling assets by sensitivity:
| Classification | Typical Use |
|---|---|
| Public | Shareable with anyone. |
| Internal‑only | Shared within the organization only. |
| Confidential | Limited to specific projects or teams. |
| Restricted | Highly sensitive, need‑to‑know (e.g., health or payment data). |
Classification determines whether an asset can be disclosed, altered, or destroyed.
2.3 Prioritizing Protection
Because resources are limited, security teams prioritize assets based on risk (the likelihood that a threat will exploit a vulnerability) and the asset’s importance to the organization.
3. Understanding Threats, Vulnerabilities, and Risk
- Threat – any circumstance or event that can negatively impact an asset (e.g., burglars, storms, accidental damage).
- Vulnerability – a weakness that can be exploited by a threat (e.g., a weak lock, cracked wood).
- Risk – the potential impact on confidentiality, integrity, or availability (the CIA triad) when a threat exploits a vulnerability.
Security planning always starts with analyzing assets, threats, and vulnerabilities—the “what, why, and how” of security.
4. Data as a Critical Asset
4.1 The Three States of Data
| State | Description | Example |
|---|---|---|
| Data in Use | Actively accessed by users or processes. | Reading email on a laptop. |
| Data in Transit | Moving between two points. | Sending a reply email. |
| Data at Rest | Stored but not currently accessed. | Email saved on a laptop’s hard drive. |
4.2 Information Security (InfoSec)
Protecting data in all three states is essential to prevent identity theft, financial loss, and reputational damage.
5. Security Plans: Policies, Standards, and Procedures
| Element | Role |
|---|---|
| Policy | High‑level rules that define what must be protected and why (e.g., Acceptable Use Policy). |
| Standard | Tactical references that specify how protection is measured (e.g., password length requirements). |
| Procedure | Step‑by‑step instructions for specific tasks (e.g., how to reset a password). |
These three elements together communicate the security plan across the organization.
6. Compliance and the NIST Cybersecurity Framework (CSF)
- Compliance – adhering to internal standards and external regulations (e.g., health, finance, energy).
NIST CSF – a voluntary framework consisting of:
Core Functions – Identify, Protect, Detect, Respond, Recover.
- Tiers – Levels 1‑4 (Passive → Adaptive) that gauge performance of each function.
- Profiles – Snapshots of an organization’s current and target states.
The CSF helps organizations manage cybersecurity risk and demonstrate a commitment to protecting customers and brand reputation.
7. Security Controls
7.1 Types of Controls
| Category | Description | Examples |
|---|---|---|
| Technical | Technology that enforces protection. | Encryption, authentication systems. |
| Operational | Day‑to‑day activities. | Security awareness training, incident response. |
| Managerial | Governance and oversight. | Policies, standards, procedures. |
7.2 Privacy Controls & the Principle of Least Privilege
- Limit access to data based on need‑to‑know.
- Distinguish data owners (decide who can access) from data custodians (handle storage and transport).
7.3 Cryptography Basics
- Encryption – transforms plaintext into unreadable ciphertext; requires a cipher and a key.
- Caesar Cipher – historic shift cipher; vulnerable to brute‑force attacks and single‑key compromise.
- Modern Encryption – uses asymmetric (public/private key pair) and symmetric (single secret key) methods.
7.4 Public Key Infrastructure (PKI)
- Asymmetric encryption establishes a secure channel (public key for encryption, private key for decryption).
- Digital certificates issued by a trusted Certificate Authority (CA) bind a public key to an entity’s identity, solving the trust problem.
7.5 Hash Functions
- One‑way algorithms (e.g., SHA‑256) generate a unique hash value for a file.
- Used to verify integrity: any change to the file produces a different hash.
7.6 Access Controls (AAA Framework)
| Component | Purpose |
|---|---|
| Authentication | Verifies who you are (knowledge, ownership, characteristic). |
| Authorization | Determines what you are allowed to do (least privilege, separation of duties). |
| Accounting | Logs what you did (session IDs, cookies, audit trails). |
- Single Sign‑On (SSO) reduces login friction but must be combined with Multi‑Factor Authentication (MFA) for security.
- Session hijacking occurs when an attacker steals a valid session token; monitoring logs helps detect it.
8. Defense in Depth
A layered security model that mirrors a medieval castle:
- Perimeter – authentication (usernames/passwords).
- Network – firewalls, segmentation.
- Endpoint – antivirus, host‑based protections.
- Application – MFA, secure coding.
- Data – classification, encryption, access controls.
If one layer fails, the next layer still protects the asset.
9. Vulnerability Management
9.1 The Process (Four Steps)
- Identify – discover vulnerabilities.
- Consider Exploits – analyze how threats could use them.
- Prepare Defenses – design mitigations.
- Evaluate – test and refine defenses.
The cycle repeats continuously because new vulnerabilities (including zero‑day exploits) appear regularly.
9.2 Defense‑in‑Depth Applied to Vulnerabilities
- Layers of controls reduce the chance that a single flaw leads to compromise.
9.3 Public Vulnerability Libraries
- CVE (Common Vulnerabilities and Exposures) – standardized IDs for known flaws.
- CVE Numbering Authority (CNA) reviews submissions against four criteria before assigning an ID.
- NIST National Vulnerability Database provides CVSS (Common Vulnerability Scoring System) scores (0‑10) to prioritize patching.
9.4 Vulnerability Assessment Steps
- Identification – scanning tools & manual testing.
- Analysis – confirm and understand each finding.
- Risk Assessment – assign severity based on impact and likelihood.
- Remediation – apply patches, change configurations, or implement new controls.
10. Attack Surfaces & Vectors
10.1 Physical vs. Digital Attack Surface
- Physical – devices, people, facilities (e.g., an unattended laptop in a coffee shop).
- Digital – everything beyond the corporate firewall, especially cloud services.
Security hardening reduces the attack surface by limiting entry points.
10.2 Common Attack Vectors
| Vector | Typical Use |
|---|---|
| Social Media | Accidental data leaks or intentional sabotage. |
| Removable Media (USB) | Malware delivery. |
| Phishing (email, smishing, vishing) | Credential theft, malware distribution. |
| Web‑based exploits | Injection attacks (XSS, SQLi). |
11. Social Engineering & Phishing
- social engineering manipulates human trust to bypass technical controls.
- Stages: Preparation → Pretexting (building trust) → Persuasion → Disconnection.
Phishing kits contain:
- Malicious attachments.
- Fake data‑collection forms.
- Fraudulent web links.
Defenses: anti‑phishing policies, employee training, email filtering, allow/block lists, intrusion‑prevention systems.
12. Malware Overview
| Type | Key Characteristic |
|---|---|
| Virus | Requires user action to execute; replicates within files. |
| Worm | Self‑propagates across networks without user interaction. |
| Trojan | Disguised as legitimate software; often a delivery mechanism for other malware. |
| Ransomware | Encrypts data and demands payment for decryption. |
| Spyware | Stealthily collects sensitive information. |
| Cryptojacking | Uses victim’s CPU/GPU to mine cryptocurrency. |
Indicators of infection: system slowdown, high CPU usage, unexpected crashes, rapid battery drain, increased electricity costs.
13. Web‑Based Exploits
13.1 Injection Attacks
- Cross‑Site Scripting (XSS) – injects malicious scripts into web pages. Types: Reflected, Stored, DOM‑based.
- SQL Injection – inserts malicious SQL code into database queries, often via unsanitized input fields.
Mitigations: input sanitization, prepared statements, secure coding practices, regular code reviews.
14. Threat Modeling
A structured way to anticipate and mitigate threats.
14.1 General Steps
- Define Scope – inventory and classify assets.
- Identify Threat Actors – internal (e.g., disgruntled employee) and external (e.g., hacker).
- Create Attack Tree – map how threats could reach assets.
- Characterize Environment – consider users, partners, vendors.
- Analyze Threats – evaluate existing controls, assign risk scores.
- Mitigate Risks – decide to avoid, transfer, reduce, or accept each risk.
- Evaluate Findings – document fixes, lessons learned, and update future models.
14.2 PASTA Framework (Example)
- Process for Attack Simulation and Threat Analysis.
- Seven stages: Business & security objectives → Technical scope → Decomposition → Threat analysis → Vulnerability analysis → Attack modeling → Risk & impact analysis.
The example follows a fitness‑app launch, showing how each stage guides the security team to protect customer data.
15. Recap of the Course Journey
| Topic | Core Takeaway |
|---|---|
| Asset Security | Identify, inventory, and classify assets; prioritize protection. |
| Data States | Protect data in use, in transit, and at rest. |
| Security Plans | Use policies, standards, and procedures to guide actions. |
| Compliance & NIST CSF | Align with industry frameworks to manage risk. |
| Controls | Apply privacy, encryption, hashing, and access controls (AAA). |
| Cryptography & PKI | Secure communication with asymmetric/symmetric encryption and digital certificates. |
| Vulnerability Management | Continuous cycle of identification, analysis, mitigation, and evaluation. |
| Attack Surfaces & Vectors | Understand physical and digital exposure points. |
| Social Engineering & Phishing | Recognize human‑focused attacks and implement awareness & technical defenses. |
| Malware | Identify types, signs, and basic prevention measures. |
| Web Exploits | Guard against XSS and SQL injection through secure coding. |
| Threat Modeling | Systematically anticipate attacks and design mitigations. |
16. What to Do Now – Action Steps
- Create an Asset Inventory – list every physical, digital, and human asset your organization relies on.
- Classify Each Asset – assign Public, Internal‑only, Confidential, or Restricted labels.
- Map Your Attack Surface – document both physical entry points (devices, facilities) and digital entry points (cloud services, external APIs).
- Adopt the AAA Framework:
- Implement MFA for all privileged accounts.
- Review and tighten authorization rules (least privilege, separation of duties).
- Enable audit logging for critical systems and set up alerts for anomalous activity.
- Establish a Vulnerability Management Cycle – schedule regular scans, prioritize CVEs using CVSS scores, and track remediation progress.
- Deploy Defense‑in‑Depth Controls – ensure you have at least one protective layer at perimeter, network, endpoint, application, and data levels.
- Develop a Phishing Awareness Program – conduct simulated phishing campaigns and provide clear reporting mechanisms.
- Start a Threat Modeling Initiative – pick a high‑risk system, follow the six‑step process, and document findings in an attack tree.
- Align with NIST CSF – map your current security activities to Identify, Protect, Detect, Respond, and Recover; identify gaps and set improvement targets.
By completing these steps, you’ll have a concrete foundation for protecting assets, managing risk, and staying ahead of evolving threats.
Congratulations on completing the course material! Your next steps are to apply these concepts in real‑world projects, continue learning about emerging threats, and contribute your unique perspective to any security team you join.
The article emphasizes that security is a multidisciplinary effort built on people, processes, and technology, requiring a clear understanding of assets and their classification. It underscores the importance of a layered defense strategy—combining policies, standards, procedures, and technical controls—to manage risk across data states, threat vectors, and vulnerabilities. Aligning with frameworks such as NIST CSF and implementing continuous vulnerability management ensures systematic risk mitigation. Finally, proactive measures like threat modeling, phishing awareness, and a robust AAA framework empower organizations to stay ahead of evolving attacks.
Takeaways
- Effective security programs rely on the integrated pillars of people, processes, and technology to protect assets.
- Classifying assets by sensitivity and prioritizing them based on risk enables focused protection efforts.
- A defense-in-depth approach, supported by policies, standards, procedures, and technical controls, mitigates the impact of threats and vulnerabilities.
- Adopting industry frameworks such as NIST CSF and maintaining a continuous vulnerability management cycle are essential for systematic risk reduction.
- Implementing the AAA framework, threat modeling, and phishing awareness programs strengthens an organization’s overall security posture.
Frequently Asked Questions
Who is Google Career Certificates on YouTube?
Google Career Certificates is a YouTube channel that publishes videos on a range of topics. Browse more summaries from this channel below.
Does this page include the full transcript of the video?
Yes, the full transcript for this video is available on this page. Click 'Show transcript' in the sidebar to read it.
2.1 What Is an Asset?
An **asset** is anything of value to an organization. Examples include: - Physical items: buildings, doors, windows, equipment. - Digital items: data, applications, intellectual property. - People: employees, customers, partners.
Helpful resources related to this video
If you want to practice or explore the concepts discussed in the video, these commonly used tools may help.
Links may be affiliate links. We only include resources that are genuinely relevant to the topic.