Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Summary

Summary CYBER SECURITY

Rating
-
Sold
-
Pages
194
Uploaded on
24-02-2025
Written in
2024/2025

Its a cyber security document

Institution
Course

Content preview

MC4205 CYBER SECURITY




UNIT I PLANNING FOR CYBER SECURITY

Best Practices-Standards and a plan of Action-Security Governance Principles, components
and Approach-Information Risk Management-Asset Identification-Threat Identification-
Vulnerability Identification-Risk Assessment Approaches-Likelihood and Impact
Assessment-Risk Determination, Evaluation and Treatment-Security Management
Function-Security Policy- Acceptable Use Policy-Security Management Best Practices -
Security Models: Bell La Padula model, Biba Integrity Model -Chinese Wall model

Practices-Standards and a plan of Action

Defining Cyberspace and Cyber security

Cyberspace consists of artifacts based on or dependent on computer and
communications technology; the information that these artifacts use, store, handle,
or process; and the interconnections among these various elements.

Cyber security

 Cyber security is the collection of tools, policies, security concepts, security
safeguards, guidelines, risk management approaches, actions, training, best
practices, assurance and technologies that are used to protect the cyberspace
environment and organization and user’s assets.

Two related terms should be mentioned:

Information security: Preservation of confidentiality, integrity, and availability of
information. In addition, other properties—such as authenticity, accountability,
non-repudiation, and reliability—can also be involved.

Network security: Protection of networks and their services from unauthorized
modification, destruction, or disclosure and provision of assurance that the network
performs its critical functions correctly and that there are no harmful side effects.

Cyber security encompasses information security, with respect to electronic
information, and network security. Information security also is concerned with
physical (for example, paper-based) information. However, in practice, the terms
cyber security and information security are often used interchangeably.

PREPARED BY A.KAVINILAVU MCA,MPHIL,. DEPARTMENT OF MCA MAM COLLEGE OF ENIGNEERING 1

, MC4205 CYBER SECURITY




A more extensive list of cyber security objectives includes the following:

Availability: The property of a system or a system resource being accessible or
usable or operational upon demand, by an authorized system entity, according to
performance specifications for the system; that is, a system is available if it provides
services according to the system design whenever users request them.

Integrity: The property that data has not been changed, destroyed, or lost in an
unauthorized or accidental manner.

Authenticity: The property of being genuine and being able to be verified and
trusted. This means verifying that users are who they say they are and that each
input arriving at the system came from a trusted source.

Non-repudiation: Assurance that the sender of information is provided with proof
of delivery and the recipient is provided with proof of the sender’s identity, so
neither can later deny having processed the information.

Confidentiality: The property that data is not disclosed to system entities unless
they have been authorized to know the data.

Accountability: The property of a system or system resource ensuring that the
actions of a system entity may be traced uniquely to that entity, which can then be
held responsible for its actions.

PREPARED BY A.KAVINILAVU MCA,MPHIL,. DEPARTMENT OF MCA MAM COLLEGE OF ENIGNEERING 2

, MC4205 CYBER SECURITY




The Value of Standards and Best Practices Documents

 The development, implementation, and management of a cybersecurity
system for an organization are extraordinarily complex and difficult.
 A wide variety of technical approaches are involved, including cryptography,
network security protocols, operating system mechanisms, database security
schemes, and malware identification.
 The areas of concern are broad, including stored data, data communications,
human factors, physical asset and property security, and legal, regulatory, and
contractual concerns.
 And there is an ongoing need to maintain high confidence in the cyber
security capability in the face of evolving IT systems, relationships with
outside parties, personnel turnover, changes to the physical plant, and the
ever-evolving threat landscape.



 On the standards side, the most prominent player is the National Institute of
Standards and Technology (NIST).
 IST has a huge number of security publications, including nine Federal
Information Processing Standards (FIPS) and well 100 active Special
Publications (SP) that provide guidance on virtually all aspects of cyber
security.
 Other organization that have produced cyber security standards and
guidelines include the ITU-T, International Organization for Standardization
(ISO), and the Internet Society (ISOC).
 In addition, a number of professional and industry groups have produced
best practices documents and guidelines. The most important such document
is the Standard of Good Practice for Information Security, produced by the
Information Security Forum (ISF).
 This 300-plus-page document provides a wide range of best practices
representing the consensus of industry and government organizations.
 Other respected organizations, including the Information Systems Audit and
Control Association (ISACA) and the Payment Card Industry (PCI), have
produced a number of similar documents.

PREPARED BY A.KAVINILAVU MCA,MPHIL,. DEPARTMENT OF MCA MAM COLLEGE OF ENIGNEERING 3

, MC4205 CYBER SECURITY




PREPARED BY A.KAVINILAVU MCA,MPHIL,. DEPARTMENT OF MCA MAM COLLEGE OF ENIGNEERING 4

Written for

Institution
Course

Document information

Uploaded on
February 24, 2025
Number of pages
194
Written in
2024/2025
Type
SUMMARY

Subjects

$6.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
aashikshariff

Get to know the seller

Seller avatar
aashikshariff MAM COLLEGE OF ENGINEERING
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions