MAN Rep
MAN Rep
On
Study of measures to be taken for ensuring cyber security
1.0 Rationale:
An engineer has to work in industry with human capital and machines. Therefore, managerial
skills are essential for enhancing their employability and career growth. This course is
therefore designed to provide the basic concepts in management principles, safety aspects and
Industrial Acts.
The literature review for the microproject "Study of Measures to be Taken for Ensuring
Cybersecurity" delves into a comprehensive examination of existing research, academic
papers, industry reports, and best practices within the realm of cybersecurity. By synthesizing
insights from diverse sources, the literature review aims to provide a holistic understanding of
the evolving cybersecurity landscape and inform subsequent analyses and recommendations.
Through this review, the project endeavors to identify key trends, challenges, and
opportunities in cybersecurity, laying the groundwork for a deeper exploration into the
measures necessary to safeguard digital assets and infrastructure.
Page1|6
5.0 Actual Methodology Followed:
Literature Review
Review existing literature on cybersecurity measures and best practices.
Data Collection:
Collect data through interviews, surveys, and analysis of cybersecurity policies.
Data Analysis
Analyze collected data to identify common threats, assess effectiveness of measures,
and pinpoint areas for improvement.
Framework Development:
Develop a practical framework or model based on analysis findings to enhance
cybersecurity posture.
Recommendations:
Provide actionable recommendations for organizations to strengthen their
cybersecurity defenses based on the developed framework.
Sr.
No. Name of resource / material Specification Quantity Remarks
1 Latest Computer Ryzen 7 processor 1
Page2|6
7.0 Measures to be taken
Keep all software components, including operating systems, applications, and firmware,
up to date with the latest security patches to address known vulnerabilities.
Establish a patch management process that includes regular identification, assessment,
testing, and deployment of patches across the organization's IT infrastructure to minimize
the risk of exploitation by cyber threats.
4. Network Security:
Page3|6
Implement network segmentation to logically isolate critical assets and sensitive data,
limiting the potential impact of breaches and unauthorized access.
5. Data Protection:
Encrypt data at rest and in transit using strong encryption algorithms and protocols to
prevent unauthorized access and maintain data confidentiality.
Implement data loss prevention (DLP) solutions to monitor, detect, and prevent the
unauthorized transmission or exfiltration of sensitive data both within and outside the
organization.
Regularly backup critical data and maintain offline or offsite backups to ensure data
availability and integrity, enabling rapid recovery in the event of ransomware attacks, data
breaches, or system failures.
Develop an incident response plan that outlines roles, responsibilities, and procedures for
detecting, responding to, and recovering from cybersecurity incidents.
Establish communication channels and contact information for reporting and escalating
incidents internally and externally, facilitating timely response and coordination with
relevant stakeholders.
Conduct regular incident response drills and exercises to test the effectiveness of the plan,
validate response procedures, and enhance response capabilities.
Page4|6
8. Vendor Risk Management:
Assess the cybersecurity posture of third-party vendors and suppliers that have access to
the organization's systems or handle sensitive data through thorough due diligence and
risk assessments.
Include cybersecurity requirements in vendor contracts and agreements, specifying
security controls, compliance with standards, and incident reporting obligations to
mitigate vendor-related risks effectively.
Implement continuous monitoring tools and techniques, such as security information and
event management (SIEM) systems, to detect and respond to cybersecurity threats in real-
time.
Stay informed about the latest cybersecurity threats and trends through threat intelligence
feeds, industry reports, and collaboration with peers and security communities, enabling
proactive threat detection and response.
Page5|6
8.0 Skill Developed / Learning Outcome of this Micro-project:
1. Research Skills: Enhance research abilities through literature review and analysis of
cybersecurity threats and measures.
2. Analytical Skills: Improve analytical capabilities by assessing risks and proposing
effective cybersecurity solutions.
3. Technical Skills: Gain proficiency in cybersecurity principles, methodologies, and
technologies.
4. Communication Skills: Develop communication proficiency in conveying complex
cybersecurity concepts effectively.
5. Problem-Solving Skills: Cultivate problem-solving aptitude in addressing cybersecurity
challenges and mitigating risks.
Page6|6