Professional Documents
Culture Documents
3 - CyberrSecurity
3 - CyberrSecurity
3 - CyberrSecurity
SECURITY
04
Prepared By:
Name
Instructor
Cyber Security
• Install a firewall
• Be suspicious of unexpected emails
✔ Identity and access
management (IAM)
✔ Firewalls
Cyber Security ✔ Endpoint protection
✔ Antimalware
Vendors and ✔ Intrusion prevention/detection
Tools systems (IPS/IDS)
✔ Data loss prevention (DLP)
✔ Endpoint detection and
response
✔ Security information and event
management (SIEM)
✔ Encryption tools
Cyber Security ✔ Vulnerability scanners
✔ Virtual private networks
Vendors and (VPNs)
Tools ✔ Cloud workload protection
platform (CWPP)
✔ Cloud access security broker
(CASB)
✔ Chief information
security officer (CISO)
✔ Chief security office
(CSO)
Who handles
✔ Security engineers
Cyber Security? ✔ Security architects
✔ Security analysts
✔ Penetration testers
✔ Threat hunters
Risk Management
Process
✔ Collect
✔ Document
✔ Monitor
✔ Resolve