Section 1 - Cyber Security Introduction and Overview
Section 1 - Cyber Security Introduction and Overview
INTRODUCTION AND
OVERVIEW
TOPIC 1—
INTRODUCTION TO
CYBERSECURITY
cybersecurity can be defined as the protection of information
assets by addressing threats to information processed, stored and
transported by internetworked information systems
1. Confidentiality means protection from unauthorized access.
2. Integrity means protection from unauthorized modification
3. availability means protection from disruptions in access.
With respect to technology, many factors can impact security, such
as:
Level of IT complexity
Network connectivity (e.g., internal, third-party, public)
Specialist industry devices/instrumentation
Platforms, applications and tools used
On-premise cloud or hybrid systems
Operational support for security
User community and capabilities
New or emerging security tools
When evaluating business plans and the general business
environment, consider drivers, such as:
Nature of business
Risk tolerance
Risk appetite
Security mission, vision and strategy
Industry alignment and security trends
Industry-specific compliance requirements and regulations
Regional regulatory and compliance requirements
Mergers, acquisitions and partnerships
Outsourcing services or providers
TOPIC 2—DIFFERENCE
BETWEEN
INFORMATION SECURITY
AND CYBERSECURITY
In the core of its cybersecurity framework, the National Institute of
Standards and Technology (NIST) identifies five key functions necessary
for the protection of digital assets. These functions coincide with incident
management methodologies and include the following activities:
Identify—Use organizational understanding to minimize risk to systems,
PROTECTING assets, data and capabilities.