Cyber Security - Complete Console
Cyber Security - Complete Console
Our society, businesses and organizations are constantly becoming more and more intertwined with online technology. Much of the data that used to be stored on paper, is now stored exclusively on hard drives so that it can be accessed faster, more easily and from remote areas. Records of customer data, emails, telephone numbers, financial and accounting information is also stored electronically. Educational institutes store their teaching material electronically and even the laws of the state are stored in a digital form. Another example of how dependent organizations are on the internet, are groups that have to do with the protection of human rights or journalists who need to use specific cryptographic programs for their communications. Their exclusive usage of digital technology to store and send sensitive information makes cyber security a top priority for these groups.
The role of cyber security in an organization is vital for the protection of its data and for ensuring that its services and projects will keep running without obstacles nor delays. Modern organizations depend almost exclusively on computer systems for storing data, contacting customers and performing various tasks such as research, marketing and strategic planning. The financial success of an organization, as well as the successful implementation of its goals will depend on the health of its computer systems. It is vital that the systems remain free from intrusions from third parties who may attempt to gain unauthorized access. Failure to ensure secure systems may lead to loss of data, loss of competitive information (such as patents or original work), loss of employees/customers private data to complete loss of public trust in the integrity of the organization. An example of a company that went bankrupt as a result of a hack, was the Dutch company DigiNotar in 2011. DigiNotar was in the business of issuing and selling certificates but a security breach allowed hackers to issue fraudulent certificates and gain access to hundreds of thousands email accounts. This company never recovered from this hack and lost the trust of its customers. It bankrupted as a result.
Cyber security is implemented through Access Control and the CIA principles. Access control is the procedure of controlling who is allowed access to information and to what extent they can alter or use this information. Access control also encompasses the control of entrance to physical facilities. A great way to understand the basics of Logical Access control is to study how forum software works. In forums, the administrator can create various groups and assign to them specific access to specific forums. He/she then assigns users to the groups. The admin can also grant special privileges to specific users who then get access to restricted forums even though they belong to different user groups. Some groups may be authorized to post announcements, while others can only reply to posts. In some forums only the group of the moderators can edit or delete posts and whole threads.
The CIA principles stand for Confidentiality, Integrity and Availability and refer to the three qualities or states of the data that we are protecting. The data needs to be kept confidential (no unauthorized access or spying), it needs to retain its integrity (no alteration, manipulation or destruction of the data) and it needs to remain available whenever it is needed (no ddos attacks or ransomware, although ransomware would endanger both the integrity and the availability of the data). Of course there are more ways to endanger the CIA qualities of data, above are mentioned only few indicative examples.
The British Standard on Information Security Management suggests the following steps concerning the planning of an Information Security Management System (ISMS): Asset identification, risk assessment, risk treatment. Here is an example on how we could implement these steps in an organization that deals with protecting the culture and heritage of abandoned villages. This organization manages a museum of folk art:
Miss Sahiba Ansari
[ B-Tech, CCNA, CCMP, CISA, CISSP, CISM, CompTIA Security+ 501, GIAC,
ISACA, Rcg certificate & MCSA Data Science ]
@Master The Core Technologies of Cyber & Network Security" we have a team of professional hackers / coders / developers, we can do many things for you overall internet world
we never doing illegal or blackhat activities, we are 100% whitehat Products / ServicesEthical Hacking - Cyber Security - Penetration Testing - Cyber Investigation - Coding - Online Tutoring - IT solution. Year of Establishement 2018 Nature of Business Service Providers Contact Person Mr. Anusha Sahiba Ansari Contact UsMiss Sahiba AnsariGanpati Classiq, wing-B 405, Site-C, UPSIDC Road, Sikandra Agra.Agra, Uttar Pradesh, 282007, India Recently Registered Companies in Agra, Uttar Pradesh |