Professional Documents
Culture Documents
Cyber Main
Cyber Main
Cyber-security is both about the insecurity made by and through this new space and about the
practices or procedures to make it (progressively) secure (Kumar, & Somani, 2018). It alludes
to a lot of exercises and measures, both specialized and non- specialized, expected to ensure
the bioelectrical condition and the information it contains and transports from all possible
threats.
MODULE 2
Identification
This step helps businesses identify network connection points in the business
environment. It can be information technology devices, resources, information, etc.
Protection
This step is to strengthen the process of access control, data security, and maintenance
in and around the business environment. It can be understood as a proactive phase of
problem-solving in network security.
Detection
This step is when businesses will find and detect potential vulnerabilities by
monitoring logs and intrusions at the network and device levels. They will carry out
both operational management and security information.
Respond
Once a vulnerability has been discovered, businesses need to respond quickly.
Understand the vulnerability, fix the flaws, and move forward with the remediation
process.
Remediation
Remediating the cybersecurity process, as well as troubleshooting and contingency
planning will be handled during this phase.
COMMON SECURITY FRAMEWORK
ISO 27001/27002 : The International Standards Organization (ISO)
which is applicable to all sectors.This framework is compared with the ISO 9000
CIS Security Control : The Center for Internet Security (CIS) has designed a set
of key security controls. These controls are crucial for businesses to implement in
their networks to achieve an efficient network.CIS has developed three sets of critical
security controls for the business. Including 20 controls, they are all fundamental and
organized. These methods can perform many of the security controls required for a
business environment.
PCI DSS : The Payment Card Industry Data Security Standard (PCI DSS) is acyber
protecting electronic transactions such as credit cards, debit cards, and cash cards.
All of the above models are built, validated, and the public to ensure businesses will
Cyber crimes have turned out to be a low-investment, low-risk business with huge returns.
Now-a-days these structured crimes are performed are highly organized. There is a perfect
hierarchical organizational setup like formal organizations and some of them have reached a
level in technical capabilities at par with those of developed nation.
Identify the risks: This step is used to evaluate an IT system or other aspects of an
organization to identify the risk related to software, hardware, data, and IT employees. It
identifies the possible adverse events that could occur in an organization such as human error,
flooding, fire, or earthquakes.
Analyse the risks: Once the risks are evaluated and identified, the risk analysis process
should analyse each risk that will occur, as well as determine the consequences linked with
each risk. It also determines how they might affect the objectives of an IT project.
Develop a risk management plan: After analysis of the Risk that provides an idea
about which assets are valuable and which threats will probably affect the IT assets
negatively, we would develop a plan for risk management to produce control
recommendations that can be used to mitigate, transfer, accept or avoid the risk.
Implement the risk management plan: The primary goal of this step is to implement
the measures to remove or reduce the analyses risks. We can remove or reduce the risk from
starting with the highest priority and resolve or at least mitigate each risk so that it is no
longer a threat.
Monitor the risks: This step is responsible for monitoring the security risk on a regular
basis for identifying, treating and managing risks that should be an essential part of any risk
analysis process.
MODULE 5
Identify Your Assets : The first step of cybersecurity starts with knowing your
IT infrastructure and environment. You cannot protect what you don’t know exists.
This Cyber Security Safeguard is essential to understand the scope of the problem and
it will make the overall process for cyber security safeguard quite organized. You also
need to gather the technical details of the hardware such as the Makes, Models, Serial
Numbers, MAC Address, IP Address, and Open Ports.
In the case of software, find out the type of software (OS and applications), version,
and whether it requires admin privilege or not. At last, collect the name of the users,
their job titles, and whether they use an administrative account or not.
A phishing attack is one of the best examples of social engineering. Here, the attacker
crafts an email in such a way that it tricks the user to take some action like clicking on
a link, downloading an attachment, or providing some really sensitive information.
These endpoints are a point of concern because they might be outside the scope of
network security (eg: Network Firewall).
Restrict Admin Privileges : Almost all operating systems support different user
accounts with different technical capabilities. In the case of Windows OS, you can
create two types of accounts i.e. user account and administrator account. The
administrator account has every privilege in the operating system and can be used to
install any application, make changes to the configuration, or disable any service.
All these capabilities of an administrator account make it the top choice for pulling off
a cyberattack or running malicious executables in the system.
MODULE 6
AUTHENTICATING PROTOCOL
User authentication is the first most priority while responding to the request made by the
user to the software application. There are several mechanisms made which are required to
authenticate the access while providing access to the data.
SAML : SAML stands for Security Assertion Markup Language which is based
on XML-based authentication data format which provides the authorization between
an identity provider and service provider. It serves as a product of the OASIS
Security Services Technical Committee.