Вы находитесь на странице: 1из 2

Confidentiality

Evolution of cybersecurity Integrity

Availability

Cybersecurity is

Information security is

Security concept and relationalship -> figure 1.3

Level of IT

Network connectivity (e.g., internal, third-party, public)

Introduction to cybersecurity Specialist industry devices/instrumentation

Platforms, applications and tools used


Factor impact security
On-premise cloud or hybrid systems

Operational support for security

User community and capabilities

New or emerging security tools

Nature of business

Risk tolerance
Provide strategic direction Cybersecurity and situational awareness
Risk appetite
Ensure that objectives are achieved
goals Governance Security mission, vision and strategy
Ascertain whether risk is being managed appropriately
consider drivers evaluating business plans : Industry alignment and security trends
Verify that the organization’s resources are being used responsibly
Industry-specific compliance requirements and regulations
Risk
Regional regulatory and compliance requirements
Compliance
Mergers, acquisitions and partnerships
Analysis of policy
Outsourcing services or providers
trend and intelligence Cybersecurity Governance
Cybersecurity Skills GAP
Process not only a wide array of technical IT Skills

Advance analytical capabilites Role of the cybersecurity professional


paper,document,digital
Information Security Deals with information regardless of its format.
Board of Directors intellectual property in people minds.
Executive Management Cybersecurity concern in protecting digital assets
Seperti pyramid, urutan tertinggi BoD dan terendah
Cybersecurity Practicioners Senior Information Security Management Difference between information security and Identify
cybersecurity
Cypersecurity Practicioners Information security role Protect

Detect

Respond
Protecting DIgital Assets
Basic risk management Recover

Common attack vectors and threat agents

Patterns and types of attacks Cybersecurity Concept


Section 1 : Cybersecurity Disclosure of information protected by privacy laws

Types of security policies and procedures Introduction and Overview Loss of public confidence

Cybersecurity control processes Loss of competitive advantage


Impact
Common security architectures and frameworks Legal action agains the enterprise

Perimeter security concepts Omtergeremce with national security

System topology and perimeter concepts Loss of compliance


discuss Security Architecture Principles Confidentiality
Firewalls and encryption

Isolation and segmentation


Access Control
Methods for monitoring, detection and logging
Control File Permissions
Risk Assessment
Encryption
Vulnerability management Process Control

Penetration Testing
basic system hardening techniques and security measure Security of Networks, Systems, Applications and Data
Cybersecurity Domains Inacurracy

System and application security threats and vulnerabilities Erroneous decisions


Best Practices for securing networks, system, application and data
Effective controls for managing vulnerabilities Impact Fraud

Failure of Hardware

Incident categories Loss of compliance


Integrity
Disaster recovery and business continuity plans Access Control
Articulate critical distinction between an event and an incident Incident Response objective is protecting digital assets
Steps of incident response Logging

Forensics and preservation of evidence Digital Signatures


Control
Hashes

Mobile devices (bring your own device [BYOD], Internet of Things [ Backups
IoT])
Encryption
Cloud computing and storage outline the theat landscape Security Implications and Adoption of Evolving Technology

Digital collaboration (social media) Loss of functionality and operational effectiveness

Loss od productive time

Impact Fines from regulators or a lawsuit


Cybersecurity Objectives Interference with enterprise objective

Loss of compliance
Availability
Redundancy of networks, system and data

Highly available system architectures

Data replication
Control
Backups

Access Controls

A Well-designed disaster recovery plan or business continuity plan

Non Repudiation

Вам также может понравиться