Cyber Security Foundations

Organizational Controls: Ensuring Effective Information Security Management

In Lecture 13, we delve into the organizational controls specified in the 2022 edition of ISO/IEC 27002. These controls are fundamental to maintaining cybersecurity within an organization. This article provides a detailed breakdown of key points discussed, emphasizing the importance of these controls and their implementation. Key ConceptsOrganizational Controls Definition: Organizational controls are policies, procedures, […]

Organizational Controls: Ensuring Effective Information Security Management Read More »

Security Controls: Essential Measures for Protecting Information Assets

In the realm of cybersecurity, implementing appropriate security controls is crucial for safeguarding information assets. Lecture 12 focuses on understanding the various types of security controls, their importance, and how they are categorized. This article breaks down the key points discussed, highlighting the importance of selecting controls based on risk assessment and various frameworks for

Security Controls: Essential Measures for Protecting Information Assets Read More »

Security for Information Processing Resources: Key Measures and Best Practices

Securing information processing resources, such as computing devices and storage systems, is vital for any organization’s cybersecurity strategy. This article explores the specific threats to these resources, with a focus on denial of service (DoS) attacks, and outlines various security controls to mitigate these risks. Key ConceptsInformation Processing Resources Definition: Information processing resources encompass computing

Security for Information Processing Resources: Key Measures and Best Practices Read More »

Understanding Types of Security Threats and Vulnerabilities

In today’s digital age, comprehending the various types of security threats and vulnerabilities is essential for protecting information assets. This article delves into the key security threats, offers guidance from reputable sources such as the UK National Cyber Security Centre (NCSC) and the US National Institute for Standards and Technology (NIST), and provides practical applications

Understanding Types of Security Threats and Vulnerabilities Read More »

Security for Data at Rest: Ensuring Safe Data Storage

Overview Lecture 10 focuses on understanding the security measures necessary to protect data while it is at rest, i.e., stored on various devices and media. This lecture discusses the specific threats to data at rest and the security controls that can be implemented to mitigate these risks. Here is a detailed breakdown of the key

Security for Data at Rest: Ensuring Safe Data Storage Read More »

Security for Data in Motion: Ensuring Safe Data Transmission

Lecture 9 focuses on understanding the security measures necessary to protect data in motion, i.e., data being transmitted across a network. This lecture covers the threats to data in motion, the role of cryptography, and the use of security protocols. Here is a detailed breakdown of the key points discussed, along with references to relevant

Security for Data in Motion: Ensuring Safe Data Transmission Read More »

Types of Information Assets: Understanding and Securing Organizational Data

Overview Lecture 8 focuses on understanding the different types of information assets within an organization and the specific security controls required to protect them. This article provides a detailed breakdown of key points discussed, including types of information, their locations, processing systems, and the security considerations needed to protect them. Key Concepts 1. Information Assets

Types of Information Assets: Understanding and Securing Organizational Data Read More »

Applying the CIA Triad to an Organization

The application of the CIA triad (Confidentiality, Integrity, Availability) within an organization involves implementing comprehensive security controls and policies. Two primary references for these controls are ISO/IEC 27002 and NIST Special Publication 800-53. This article provides an in-depth look at how these standards help manage and apply the CIA principles in organizational settings. Key Standards

Applying the CIA Triad to an Organization Read More »

Using CIA to Build Robust Cybersecurity Measures

Overview Lecture 7 focuses on how the CIA triad (Confidentiality, Integrity, Availability) can be applied to develop strong cybersecurity measures within an organization. This article discusses the role of the CIA triad in various aspects of cybersecurity, including risk management, security controls, and security audits, along with references for further reading. Key Concepts 1. CIA

Using CIA to Build Robust Cybersecurity Measures Read More »

Exploring Alternative Approaches to the CIA Triad

Overview The CIA triad (Confidentiality, Integrity, Availability) is foundational to cybersecurity, but other models and frameworks expand on it to address limitations and capture additional security aspects. This article explores alternative approaches and provides references for further reading. Alternative Approaches to CIA 1. NIST Special Publication 800-33 Reference: Summary: NIST Special Publication 800-33 expands on

Exploring Alternative Approaches to the CIA Triad Read More »