0% found this document useful (0 votes)
16 views

Security

cyber security

Uploaded by

shakib20000605
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Security

cyber security

Uploaded by

shakib20000605
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Security Measurements

for Organizations
Cybersecurity Overview
Cybersecurity is the practice of protecting systems, networks, and programs from
digital attacks.

Key Objectives (CIA Triad) Common Cyber Threats


Security Lifecycle

Assessment and Planning Continuous Assessment


Improvement and Planning
Identify and evaluate organizational assets, risks, and
and security requirements. Optimization

Key Tasks:
• Conduct risk assessments Compliance Prevention and
and Auditing Protection
• Establish security baselines
• Create a strategic security roadmap
Incident
Detection and
Response and
Monitoring
Regulatory
Security Lifecycle

Prevention and Protection Continuous


Improvement Assessment
Implement safeguards to protect assets against and and Planning
threats and vulnerabilities. Optimization

Key Tasks:
• Apply firewalls Compliance Prevention and
and Auditing Protection
• Encryption
• Access controls
• Endpoint protection
Incident
Detection and
Response and
Monitoring
Regulatory
Security Lifecycle

Detection and Monitoring Continuous


Improvement Assessment
Continuously monitor for unusual activity and and and Planning
security breaches. Optimization

Key Tasks:
• Set up intrusion detection systems Compliance Prevention and
and Auditing Protection
• Network monitoring
• Real-time alerting mechanisms
Incident
Response and Detection and
Regulatory Monitoring
Security Lifecycle

Incident Response and Regulatory Continuous


Improvement Assessment
Respond effectively to security incidents to and and Planning
minimize impact. Optimization

Key Tasks:
• Develop an incident response plan Compliance Prevention and
and Auditing Protection
• Comply with regulatory requirements
• Report breaches (if required)

Incident Detection and


Response and Monitoring
Regulatory
Security Lifecycle

Compliance and Auditing Continuous


Improvement Assessment
Ensure adherence to security standards and and and Planning
regulatory frameworks. Optimization

Key Tasks:
• Conduct regular audits Compliance Prevention and
and Auditing Protection
• Review security policies
• Maintain compliance documentation
Incident
Detection and
Response and
Monitoring
Regulatory
Security Lifecycle

Continuous
Continuous Improvement and Improvement
and Assessment
Optimization Optimization and Planning
Evolve security measures based on lessons
learned and new threats.
Compliance Prevention and
Key Tasks: and Auditing Protection
• Update policies
• Improve response strategies
• Adopt advanced security technologies Incident
Detection and
Response and
Monitoring
Regulatory
Security Surveillance Framework

Security
Surveillance
Framework

Physical Cyber
Surveillance Surveillance

Access Intrusion
Alarm Network
CCTV Cameras Control Log Analysis Detection
Systems Monitoring
Systems Systems
Endpoint Security for Organization
1. Monitoring & Detection:

• Endpoint Activity Monitoring: Track connected device activity to identify unauthorized access.
• EDR Systems: Use Endpoint Detection and Response for real-time threat analysis and
remediation.
• Suspicious Behavior Alerts: Set up alerts for unusual endpoint activities.

2. Regular Audits:

• Conduct routine audits on device access to ensure compliance with security protocols.

3. Device Protection:

• Safeguarding Devices: Implement comprehensive security for devices accessing the network.
• Antivirus Solutions: Deploy antivirus and anti-malware software to guard against malicious
attacks.

4. Enhanced Access Security:

• Multi-Factor Authentication (MFA): Require multiple verification steps before device access.
• Mobile Device Management (MDM): Manage and secure mobile devices accessing the
network.
Internet Security for Organization
1. Monitoring & Detection:

• Online Activities: Proactively monitor for suspicious activities to prevent threats.


• Real-time Monitoring: Use advanced tools to continuously assess online threats.
• SIEM Systems: Centralize security logs and alerts for efficient threat detection.

2. Threat Response:

• Alerts & Reporting: Immediate notifications for unusual online behaviors.


• Firewall & IDPS: Deploy firewalls and intrusion prevention systems to block unauthorized
access.

3. Secure Infrastructure:

• Communication Protocols: Use HTTPS and VPNs for encrypted transactions.


• Employee Training: Educate staff on recognizing phishing and other cyber threats.

4. Infrastructure Protection:

• Online Infrastructure: Implement strong security protocols to safeguard customer


interactions.
Data Security for Organization
1. Data Monitoring & Protection

• Data Access Monitoring: Continuously monitor who accesses data to prevent unauthorized
breaches.
• Data Loss Prevention (DLP): Use DLP software to block data exfiltration and unauthorized
access.

2. Regular Audits & Compliance

• Data Audits: Conduct periodic audits to maintain data security integrity.


• Access Control Policies: Set strict access controls to ensure only authorized personnel handle
sensitive data.

3. Data Confidentiality & Encryption

• Encryption Protocols: Encrypt sensitive data to safeguard it during storage and transmission.
• Data Confidentiality: Apply strong protection measures to keep customer information private.

4. Incident Response

• Response Protocols: Establish procedures for responding swiftly to data breaches or


unauthorized access incidents.
Security
Products
Overview
Case Study:
Bank Security

You might also like