Virus الفيروسات
Malware which changes, corrupts, or destroys information, and
is then passed on to other systems, usually by otherwise benign
means (e.g. sending an email). In some cases, a virus can
actually cause physical damage.
Worm الدودة
Malware that can reproduce itself for the purposes of
spreading itself to other computers in the network. Particularly
nasty, worms can either be simply a means of slowing down a
system by eating up resources, or by committing exploits such
as installing back doors or stealing data.
Information Security امن المعلومات
It refers to the processes and tools designed and deployed to
protect sensitive business information from modification,
.disruption, destruction, and inspection
Confidentiality سرية المعلومات
It is the need to ensure that information is disclosed only to
those who are authorized to view it.
Integrity النزاهة في التعامل مع المعلومات
It is the need to ensure that information has not been changed
accidentally or deliberately, and that it is accurate and
complete.
سرية المعلومات
Availability توافر المعلومات
1
Availability is the need to ensure that data are accessible to
authorized persons who need to use them.
The NIST Cybersecurity Framework (NIST CSF)
اطار العمل وفقا للمعهد الوطني للمعايير و التكنولوجيا
It consists of standards, guidelines, and best practices that help
organizations improve their management of cybersecurity risk. The
NIST CSF is designed to be flexible enough to integrate with the
existing security processes within any organization, in any
industry.
Identity تحديد الهوية
It assists in developing an organized undersdaning to manage
cybersecurity risks to idivisuals systems, assets, data and
tenderness. .
It is the need to ensure that information is disclosed only to those who
Protection الحماية
Malware which changes, corrupts, or destroys information, and
is then passed on to other systems, usually by otherwise benign
means (e.g. sending an email). In some cases, a virus can
actually cause physical damage.
Thread Detection (TD)
كشف او رصد التهديدات
2
It refers to cybersecurity tools that identify threats by analyzing
user behaviors.
arThreat Response (TR)
االستجابة للتهديدات
It refers to cybersecurity tools that prevent cyber threats.
Recover االستعادة
It is the need to develop and implement the appropriate
activities to restore any capabilities or services that were
effected.
Penetration Testing اختبار االختراق
It is a security test where a cybersecurity expert attempts to
identify the vulnerabilities in a computer system that is to
evaluate the security of the system.
WMobile Penetration Testing
اختبار اختراق الموبايل
It is a security test where a cybersecurity expert attempts to
identify the vulnerabilities in a web to protect it against
attacks.
Application Security
امن التطبيقات
3
There are various kinds of application security programs,
services, and devices that an organization can use .Firewalls,
antivirus systems and data encryption are just few examples to
prevent unauthorized users from entering a system.
Penetration Testing
Cyber Security Cyber Security Analyst
محلل االمن السيبراني
• He is responsible for data security & for information
system analysise to detect and response to any
threats.
It is a secCyber Security Engineer
مهندس االمن السيبراني
• He is responsible for developing software that
protects information and information systems.
urity test where a cybersecurity expert attempts to identify the Cyber
Security Manager
مدير االمن السيبراني
• He monitors cybersecurity strategies and leads
cybersecurity team. He is responsible for
implementing and coordinates security policies.
in a web to protect it against attacks.
4
e authorized to view it.
Cyber Security Threat Intelligence Specialist
مختص تهديدات االمن السيبراني
He is responsible for collecting and analyzing data related to
cyber threats & intelligence. He provides reports and
assessments that assists in identifying the vulnerabilities and
in taking preventive actions.
Cyber Security Policy Specialist
مختص تطوير السياسات االمنية
• He is responsible for developing and implementing
cybersecurity policies and ensures their
implementation accurately and effectively
Cyber Security Policy Specialist
مختص تطوير السياسات االمنية
• He is responsible for developing and implementing
cybersecurity policies and ensures their implementation
accurately and effectively
Cyber Security Threat Response Analyst
محلل استجابة للتهديدات السيبرانية
• He is responsible for responding & investigating cyber
incidents and for applying recovery and response
procedures.
5
Cyber Security Awareness Training Specialist مختص تدريب الوعي
االمني
• He is responsible for designing and conducting security
awareness programs for employees about cybersecurity risk
and how to be protected.