Cyber Security

Computer security, cyber security or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Your Protection

Definition: Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation. ... Network security includes activities to protect the usability, reliability, integrity and safety of the network. Statistically 75% is protected rest is live protection of systems and this area need every day new specialists.

Also we follow standarts ISO/IEC 27001, ISO/IEC 27002 The NIST Cybersecurity Framework (NIST CSF) The European Telecommunications Standards Institute (ETSI), ANSI/ISA 62443. 

“LIFE IS A JOURNEY, NOT A DESTINATION.”

Image
Image

Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security

Cyber Security isavailabilityintegrityconfidentialityfrom the beginning.

Most fist steps in Cyber Security

Most fist steps
in Cyber Security

1. Survey the field
2.Combine reading and practice
3.Seek deep learning, not just reading
4.Develop a malicious mindset
5.Be dauntless
Good luck, happy hunting!

Building and managing a security program is an effort that most organizations grow into overtime. I have worked with startups who had no rules for how assets or networks were used by employees. Next will be by SANS.

Acceptable Use Policy (AUP)

An AUP stipulates the constraints and practices that an employee using organizational IT assets must agree to in order to access to the corporate network or the internet. It is standard onboarding policy for new employees. They are given an AUP to read and sign before being granted a network ID. It is recommended that and organizations IT, security, legal and HR departments discuss what is included in this policy. An example that is available for fair use can be found at SANS.

Access Control Policy (ACP)
Change Management Policy
Information Security Policy

An organization’s information security policies are typically high-level policies that can cover a large number of security controls. The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines. I have seen organizations ask employees to sign this document to acknowledge that they have read it (which is generally done with the signing of the AUP policy). This policy is designed for employees to recognize that there are rules that they will be held accountable to with regard to the sensitivity of the corporate information and IT assets. The State of Illinois provides an excellent example of a cybersecurity policy that is available for download.

Incident Response (IR) Policy
Remote Access Policy
Email/Communication Policy

A company's email policy is a document that is used to formally outline how employees can use the business’ chosen electronic communication medium. I have seen this policy cover email, blogs, social media and chat technologies. The primary goal of this policy is to provide guidelines to employees on what is considered the acceptable and unacceptable use of any corporate communication technology. An example of an email policy is available at SANS.

Disaster Recovery Policy
Business Continuity Plan (BCP)

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or at least reducing the probability of unauthorized/inappropriate access, use, disclosure, disruption, deletion/destruction, corruption, modification, inspection, recording or devaluation, although it may also involve reducing the adverse impacts of incidents. Information may take any form, e.g. electronic or physical., tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves:

  • Identifying information and related assets, plus potential threats, vulnerabilities and impacts;
  • Evaluating the risks;
  • Deciding how to address or treat the risks i.e. to avoid, mitigate, share or accept them;
  • Where risk mitigation is required, selecting or designing appropriate security controls and implementing them;
  • Monitoring the activities, making adjustments as necessary to address any issues, changes and improvement opportunities.

To standardize this discipline, academics and professionals collaborate to offer guidance, policies, and industry standards on password, antivirus software, firewall, encryption software, legal liability, security awareness and training, and so forth. This standardization may be further driven by a wide variety of laws and regulations that affect how data is accessed, processed, stored, transferred and destroyed. However, the implementation of any standards and guidance within an entity may have limited effect if a culture of continual improvement isn't adopted.

Certified Information Systems Security Professional (CISSP) is an independent information security certification granted by the International Information System Security Certification Consortium, also known as (ISC)² I suggsest everyone to go true this cource to understand deep cyber security challegens and possibilities. 

The CISSP curriculum covers subject matter in a variety of Information Security topics.– a collection of topics relevant to information security professionals around the world. The CISSP establishes a common framework of information security terms and principles that allow information security professionals worldwide to discuss, debate and resolve matters pertaining to the profession with a common understanding.

  • Security and Risk Management
  • Asset Security
  • Security Architecture and Engineering
  • Communication and Network Security
  • Identity and Access Management (IAM)
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Cooperation with Governments and companyes. We need to train people to increase their knowledge in the field of cyber security.

© 2020