0% found this document useful (0 votes)
14 views6 pages

Virus الفيروسات

The document defines several key cybersecurity terms including virus, worm, information security, confidentiality, integrity, availability, and the NIST Cybersecurity Framework. It then describes the roles and responsibilities of several cybersecurity positions such as the cybersecurity analyst, engineer, manager, threat intelligence specialist, policy specialist, threat response analyst, and awareness training specialist.

Uploaded by

Afrah Anwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

Virus الفيروسات

The document defines several key cybersecurity terms including virus, worm, information security, confidentiality, integrity, availability, and the NIST Cybersecurity Framework. It then describes the roles and responsibilities of several cybersecurity positions such as the cybersecurity analyst, engineer, manager, threat intelligence specialist, policy specialist, threat response analyst, and awareness training specialist.

Uploaded by

Afrah Anwar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Virus ‫الفيروسات‬

Malware which changes, corrupts, or destroys information, and


is then passed on to other systems, usually by otherwise benign
means (e.g. sending an email). In some cases, a virus can
actually cause physical damage.
Worm ‫الدودة‬
Malware that can reproduce itself for the purposes of
spreading itself to other computers in the network. Particularly
nasty, worms can either be simply a means of slowing down a
system by eating up resources, or by committing exploits such
as installing back doors or stealing data.
Information Security ‫امن المعلومات‬
It refers to the processes and tools designed and deployed to
protect sensitive business information from modification,
.disruption, destruction, and inspection
Confidentiality ‫سرية المعلومات‬
It is the need to ensure that information is disclosed only to
those who are authorized to view it.
Integrity ‫النزاهة في التعامل مع المعلومات‬

It is the need to ensure that information has not been changed


accidentally or deliberately, and that it is accurate and
complete.
‫سرية المعلومات‬

Availability ‫توافر المعلومات‬

1
Availability is the need to ensure that data are accessible to
authorized persons who need to use them.

The NIST Cybersecurity Framework (NIST CSF)

‫اطار العمل وفقا للمعهد الوطني للمعايير و التكنولوجيا‬

It consists of standards, guidelines, and best practices that help


organizations improve their management of cybersecurity risk. The
NIST CSF is designed to be flexible enough to integrate with the
existing security processes within any organization, in any
industry.

Identity ‫تحديد الهوية‬


It assists in developing an organized undersdaning to manage
cybersecurity risks to idivisuals systems, assets, data and
tenderness. .

It is the need to ensure that information is disclosed only to those who


Protection ‫الحماية‬
Malware which changes, corrupts, or destroys information, and
is then passed on to other systems, usually by otherwise benign
means (e.g. sending an email). In some cases, a virus can
actually cause physical damage.

Thread Detection (TD)


‫كشف او رصد التهديدات‬

2
It refers to cybersecurity tools that identify threats by analyzing
user behaviors.
arThreat Response (TR)
‫االستجابة للتهديدات‬
It refers to cybersecurity tools that prevent cyber threats.

Recover ‫االستعادة‬
It is the need to develop and implement the appropriate
activities to restore any capabilities or services that were
effected.
Penetration Testing ‫اختبار االختراق‬
It is a security test where a cybersecurity expert attempts to
identify the vulnerabilities in a computer system that is to
evaluate the security of the system.

WMobile Penetration Testing


‫اختبار اختراق الموبايل‬
It is a security test where a cybersecurity expert attempts to
identify the vulnerabilities in a web to protect it against
attacks.

Application Security
‫امن التطبيقات‬

3
There are various kinds of application security programs,
services, and devices that an organization can use .Firewalls,
antivirus systems and data encryption are just few examples to
prevent unauthorized users from entering a system.

Penetration Testing

Cyber Security Cyber Security Analyst

‫محلل االمن السيبراني‬


• He is responsible for data security & for information
system analysise to detect and response to any
threats.

It is a secCyber Security Engineer


‫مهندس االمن السيبراني‬
• He is responsible for developing software that
protects information and information systems.
urity test where a cybersecurity expert attempts to identify the Cyber
Security Manager
‫مدير االمن السيبراني‬
• He monitors cybersecurity strategies and leads
cybersecurity team. He is responsible for
implementing and coordinates security policies.
in a web to protect it against attacks.

4
e authorized to view it.
Cyber Security Threat Intelligence Specialist
‫مختص تهديدات االمن السيبراني‬
He is responsible for collecting and analyzing data related to
cyber threats & intelligence. He provides reports and
assessments that assists in identifying the vulnerabilities and
in taking preventive actions.

Cyber Security Policy Specialist


‫مختص تطوير السياسات االمنية‬
• He is responsible for developing and implementing
cybersecurity policies and ensures their
implementation accurately and effectively

Cyber Security Policy Specialist


‫مختص تطوير السياسات االمنية‬
• He is responsible for developing and implementing
cybersecurity policies and ensures their implementation
accurately and effectively

Cyber Security Threat Response Analyst


‫محلل استجابة للتهديدات السيبرانية‬
• He is responsible for responding & investigating cyber
incidents and for applying recovery and response
procedures.

5
Cyber Security Awareness Training Specialist ‫مختص تدريب الوعي‬
‫االمني‬
• He is responsible for designing and conducting security
awareness programs for employees about cybersecurity risk
and how to be protected.

You might also like