cyber security controls india
Cyber Threat
1

Cyber Security Control

Project Name: Cyber Security Control
Description: Cyber Security Control India blog will help each IT employee to understand information environment in better way. The components of Cyber Security Controls

Author: Rohit D Sadgune

Summary of Content

  1. Components Of Cyber Security Controls
  2. Basic Requirement of Cyber Security Controls
  3. What are the different Information Security aspects to be considered for Cyber Security

What is a Cyber Security?

Cybersecurity is the division of information technology whose primary objective is to implement processes and practices configure to protect networks, computers, enterprise application and data from attack, damage or unauthorized.

Principle objective of cyber security is to maintain Confidentiality, Integrity, and Availability over the entire enterprise

Why Cyber Security Controls are important?

  • On daily basis new attack are getting invented, the volume of these attack are very high. These attack includes threats, targeted attacks, advance persistence threats, phishing scams, data leakages
  • On daily the average unprotected systems are increasing..
  • Millions of infected web pages are being discovered every day.
  • Hundreds of millions of events are involved in data breaches.
  • New attack methods are launched continuously.

 

cyber security controls india
cyber security control

Cyber Security Control

  1. Assets collections & management
  2. Logical asses collection & management (software / application inventory)
  3. Standard security configuration for all physical and logical assets
  4. Vulnerability management for respective assets of enterprise
  5. Malware Investigation
  6. Vulnerability assessment & Penetration testing for all application
  7. Continuous knowledge transfers & training sessions for employees
  8. Identity & access management
  9. Perimeter security
  10. Security information and event management
  11. Digital Forensics & Incident Response
  12. Monitoring threat intelligence.

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Cyber Security Lifecycle
Cyber Threat
1
Cyber Security Lifecycle

Cyber Security Lifecycle Project Name: Cyber Security Lifecycle Description: Without applying a Lifecycle mechanism to a cyber security in any organization there arises an increased risk of cyber threats affecting the system. A systematic approach in any organization delivers and resist the cyber-attacks, persistent threats to a great extent. The cyber …

Types of System Software
Cyber Threat
Types of System Software

Types of System Software Project Name: Types of System Software Description: This blog will help to understand Types of System Software Author: Rohit D Sadgune / Amruta Sadgune Frequently Asked Question on Types of System Software What are different types of system software? What are the different types of software? …

Computer and Network Log Analytics
Cyber Threat
Computer and Network Log Analytics

Computer and Network Log Analytics Project Name: Computer and Network Log Analytics Description: This blog will help you to understand Computer and Network Log Analytics. Security Logs Category, Operating System Logs Analysis, Application Logs, Security Software Logs Analysis, Router Log Files Analysis, Linux Process Account Analysis, Windows Log Files Analysis Author: …

%d bloggers like this: