CYBERSECURITY

Cards (14)

  • Cybersecurity
    The protection of internet-connected systems such as hardware, software and data from cyber threats
  • Cybersecurity
    • Encompasses a multifaceted approach to protect networks, systems, and data from an array of ever-evolving threats, ranging from malicious hackers to sophisticated cybercriminal organizations
    • Serves as the frontline defense, ensuring the integrity, confidentiality, and availability of information in our interconnected world
  • Cybersecurity is important for safeguarding data, personal privacy, critical infrastructure, national security, and global security
  • Elements of cybersecurity
    • Application security
    • Operational security
    • Information or data security
    • Cloud security
    • Network security
    • Critical infrastructure security
    • Disaster recovery/business continuity planning
    • Physical security
  • Stages of Cybersecurity
    1. Identify
    2. Protect
    3. Detect
    4. Respond
    5. Recover
  • Identify stage
    Catalog and comprehend the systems, assets, and people who comprise and influence your network and its security
  • Protect stage

    Defend your data and assets, put processes in place to ensure your organization can limit the detrimental impact of a breach
  • Detect stage
    Discover breaches and other cybersecurity events promptly
  • Respond stage

    Take action to contain and mitigate the impact of a breach
  • Recover stage
    Restore full functionality after a breach, return to normal operations and performance
  • Cybersecurity Protection
    • Risk Assessment
    • Security Policies and Procedures
    • Access Control
    • Firewalls and Network Security
    • Encryption
    • Regular Software Updates
    • Employee Training
    • Incident Response Plan
  • Incident Response
    • Detection
    • Containment
    • Eradication
    • Recovery
    • Communication
    • Post-Incident Analysis
    • Legal and Regulatory Compliance
    • Continuous Improvement
  • Cybersecurity regulations serve as a framework designed to protect individuals and organizations from various cyber threats
  • Cybersecurity Risk Management Process
    • Identifying Risk
    • Assessing Risk
    • Controlling Risk
    • Reviewing Controls