0% found this document useful (0 votes)
2 views

Module 1

The document outlines the twelve principles of cyber security, emphasizing the importance of risk management, data integrity, and the need for a multi-faceted approach involving people, processes, and technology. It also discusses data security considerations, including protection against unauthorized access and the significance of backups, archival storage, and proper data disposal methods. Key practices for secure backup and recovery are highlighted, along with the differences between data backup and archival storage.

Uploaded by

yashingole20031
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module 1

The document outlines the twelve principles of cyber security, emphasizing the importance of risk management, data integrity, and the need for a multi-faceted approach involving people, processes, and technology. It also discusses data security considerations, including protection against unauthorized access and the significance of backups, archival storage, and proper data disposal methods. Key practices for secure backup and recovery are highlighted, along with the differences between data backup and archival storage.

Uploaded by

yashingole20031
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Cyber Security-II

MCS202
Module 1
Cyber Security Principal
• Cyber Security standards are the security standards which enable
organization to practice safe security techniques to minimize the
number of successful cyber attacks.
• Its refers to technologies, process etc.
• There are total twelve Principals of cyber security.
Principal’s

• Principle 1: There Is No Such Thing As Absolute Security


• Principle 2: The Three Security Goals Are Confidentiality,
Integrity, and Availability
• Principle 3: Defense in Depth as Strategy
• Principle 4: When Left on Their Own, People Tend to Make the
Worst Security Decisions.
• Principle 5: Computer Security Depends on Two types of
Requirements: Functional and Assurance
• Principle 6: Security Through Obscurity Is Not an Answer
• Principle 7: Security = Risk Management
• Principle 8: The Three Types of Security Controls Are Preventative,
Detective, and Responsive
• Principle 9: Complexity Is the Enemy of Security
• Principle 10: Fear, Uncertainty, and Doubt Do Not Work in Selling
Security
• Principle 11: People, Process, and Technology Are All Needed to
Adequately Secure a System or Facility.
• Principle 12: Open Disclosure of Vulnerabilities Is Good for Security!
Data security consideration

• Data security is protection of programs and data in computers


and communication systems against unauthorized access,
modification, destruction, disclosure or transfer whether
accidental or intentional by building physical arrangements
and software checks.
• Data security uses various methods to make sure that the data is
correct, original, kept confidentially and is safe. It includes-
• Ensuring the integrity of data.
• Ensuring the privacy of the data.
• Prevent the loss or destruction of data.
• Data security consideration involves the protection of data
against unauthorized access, modification, destruction, loss,
disclosure or transfer whether accidental or intentional. Some of the
important data securities are:
• Backups
• Archival Storage
• Disposal of Data
Backup
• Data backup refers to save additional copies of our data in separate
physical or cloud locations from data files in storage securing of the
data will help us to prevent from-
• Accidental or malicious damage/modification to data.
• Theft of valuable information.
• Breach of confidentiality agreements and privacy laws.
• Premature release of data which can avoid intellectual properties claims.
• Release before data have been checked for authenticity and accuracy.
• Some important backup options are-
• Hard drives - personal or work computer
• Departmental or institution server
• External hard drives
• Tape backups
• Discipline-specific repositories
• University Archives
• Cloud storage
• Some of the top considerations for implementing secure backup and
recovery are-
• Authentication of the users and backup clients to the backup server.
• Role-based access control lists for all backup and recovery operations.
• Data encryption options for both transmission and the storage.
• Flexibility in choosing encryption and authentication algorithms.
• Backup of a remote client to the centralized location behind firewalls.
• Backup and recovery of a client running Security-Enhanced Linux (SELinux).
• Using best practices to write secure software.
Archival Storage

• Data archiving is the process of retaining or keeping of data at a secure place


for long-term storage.
• Data archival is different from data backup in the sense that data backups
created copies of data and used as a data recovery mechanism to restore data
in the event when it is corrupted or destroyed.
• Data archives may have many different forms. It can be stored as Online,
offline, or cloud storage-
• Online data storage places archive data onto disk systems where it is readily accessible.
• Offline data storage places archive data onto the tape or other removable media using
data archiving software.
• Cloud storage is also another possible archive target.
Disposal of data
• Data destruction or disposal of data is the method of destroying
data which is stored on tapes, hard disks and other electronic media
so that it is completely unreadable, unusable and inaccessible for
unauthorized purposes.
• It avoids the unnecessary storage costs incurred by using office or
server space in maintaining records which is no longer needed by the
organization.
• Finding and retrieving information is easier and quicker because there
is less to search.

You might also like