Skip to main content

Concepts of Cybersecurity

Q:  What is cybersecurity.?

A: Cyber security, also referred to as information technology security, focuses on protecting Information technology assets and its information Cybersecurity is the collection policies, procedures, guidelines and risk management approaches. The NIST framework includes Identify, Protect, Detect, Respond and Recover.

Q: What is NIST framework IDENTIFY


A: NIST Framework identify includes 

  •  Identifying physical and software assets
  •  Identifying cybersecurity policies
  •  Identifying asset vulnerabilities
  •  Identifying a Risk Management Strategy
  •  Identifying authorization
  •  Identifying authentication roles

Q: What is NIST Cybersecurity Framework  - PROTECT
A: NIST framework protect includes 
  • Protections for Identity Management
  • Protection for physical assets
  • Protection for data
  • Protect technology
  • Proper change management
  • Disaster recovery 
Q: What is NIST Cybersecurity Framework  - DETECT
A: NIST framework detect includes
  • Protections for Identity Management
  • Protection for physical assets
  • Protection for data
  • Protect technology
  • Proper change management
  • Disaster recovery

Comments

Post a Comment

Popular posts from this blog

Understanding Ransomware

Ransomware is a type of malicious software designed to encrypt or block access to a victim's files or entire computer system. The attackers demand a ransom payment, typically in cryptocurrencies, in exchange for providing the decryption key or restoring access. This insidious form of cyberattack has evolved over the years, becoming more sophisticated and causing significant disruption.   The impact of ransomware attacks can be devastating on multiple levels. For individuals, it can result in the loss of personal data, compromising sensitive information like financial records or personal documents. In businesses, ransomware can disrupt operations, leading to financial losses, reputational damage, and potential legal implications. Critical infrastructure, such as healthcare or government systems, can also become targets, risking public safety and national security.

Information security !!!

 

How to clear CISSP

Familiarize yourself with the exam content: The CISSP exam covers a wide range of topics, including security and risk management, asset security, security engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. It's important to have a solid understanding of all of these areas in order to be successful on the exam. Review the exam objectives: The CISSP exam objectives are published by (ISC)², the organization that administers the certification. Reviewing these objectives will help you understand the specific areas that the exam will test. Study the (ISC)² CISSP Common Body of Knowledge (CBK): The CISSP CBK is a comprehensive guide to the knowledge and skills that are required for the certification. It covers all of the exam domains in detail and is a valuable resource for exam preparation. Take a study course or use study materials: There are many study courses and mate...