Академический Документы
Профессиональный Документы
Культура Документы
Competency Guide
Enable End-to-End Citizen Experience
of CYBER Security and Data PRIVACY
Notification and Disclaimer
Personal Data Privacy:
The name and email addresses collected, retained, and used in the
seminar are to recognize the participants and to send learning materials
and training information. The participant during the online live seminar
may opt to close his or her camera and simply use the microphone or
chat for questions and comments. The online live seminar is not
streamed in Facebook or YouTube without consent.
Copyright Notice:
The cited and annotated content of cited standards are duly owned by
their research organization or publishers.
The provided information about the rules and standards are for
educational purpose.
Belief on Competency Building
Governance of Information
Security
System by which an organization’s
information security activities are
directed and controlled.
(ISO 27000 3.23)
Common Concept
• Cyber Infrastructure is the system of
hardware, software, facilities and service components
that support the delivery of business systems and
digital-enabled processes.
DNS
server
CLOUD
Web Intranet-Internet
server SERVICES
Database
Server GATEWAY
Apps
Server
5
CONNECTIVITY Structured/
Bandwidth and Network Services ENVIRONMENT Unstructured
Data
CUSTOMER
“Data Subject” CYBER INFRASTRUCTURE
PROCESS, DATA, APPLICATION & INFRASTR
CUSTOMER DATA
EXPERIENCE CRM COLLECT ERP
1. Value E DATA ADMIN
2. Availability APPS STORE FINANCE ITSM
M
3. Completeness
RECORD
4. Accuracy R DATA
DPA PPM
DATASHARE DATA
5. Speed
6. Reach
7. Coverage DATA SECURE DISPOSE
8. Mobility USE
9. Portability
10. Privacy
CYBER INFRASTRUCTURE
What are the look up references for the
cyber crime and data privacy risks that
must be mitigated?
R.A. 10175 An act defining cybercrime, providing for the
Cybercrime prevention, investigation, suppression and the
Prevention Act of
2012 imposition of penalties therefore and for other
purposes
Interception
1.3 Data Interference. Intentional or reckless alteration, damaging, deletion of
computer data
1.4 System Intentional alteration or reckless interference with the
functioning of a computer or computer network
Interference
1.5 Misuse of Devices Use, production, sale, procurement, importation, distribution,
Cyber Crime
2. It is offense related with the use of computer.
1. https://nvd.nist.gov/vuln/search
2. http://cve.mitre.org/about
3. https://www.exploit-db.com/
Cyber Security Normative
References
Cyber Security Control Guidance
1. What to achieve
2. What to prevent
3. What to maintain
4. What to eliminate