You are on page 1of 4

Planning of cyber security

• A cyber security plan specifies the security policies, procedures, and controls required to protect
an organization against threats and risk.
• A cyber security plan can also help specify steps to take to respond to an exploitation.
Cyber security plan is the technologies that any organization will rely on when seeking the security of
their systems.
Why Is a Cyber security Plan Important?
• Cyber-attacks can sink your business’ value, but it can also affect the confidence your customers
have in your ability to keep their sensitive information safe.
• A well-thought-out cybersecurity plan helps your business plan for the worst while giving you a
roadmap to navigate an exploitation calmly and methodically.
• 10-Step to plan Cybersecurity
• Inform your employees about your cybersecurity policies.
• Update your software.
• Place a firewall.
• Back up all your data regularly.
• Secure your Wi-Fi networks.
• Install anti-malware software.
• Make an action plan for mobile devices.
• Implement strong data protection procedures.
• Use strong passwords.
• Restrict authority for software installations

steps for successful security strategy


• Conduct A Security Risk Assessment: security risk assessment helps
determine the value of the various types of data generated and stored
across the organization.
• Set Your Security Goals: what you need to protect, how to protect.
• Evaluate Your Technology: systems meet security best practices,
understand how the system function on the network.
• Select A Security Framework: The security framework will provide
guidance on the controls needed to continuously monitor and measure the
security posture of your organization.
Benefits for Cyber Security Plans
• Gain Better Understanding of Risks
• Get Better IT Team Support
• Prevent Insider Threats
• Training and awareness
• Improving your capacities.
• Reducing your vulnerabilities

Policy of cybersecurity
• A cybersecurity policy is a written document that contains behavioral and
technical guidelines for all employees in order to ensure maximum
protection from cybersecurity incidents.
• Policies are a set of written practices and procedures that all employees
must follow to ensure the confidentiality, integrity, and availability of data
and resources.
• The security policy provides what the expectations are for the business,
how they are to be achieved, and describes the consequences for failure
with the goal of protecting the organization.
Why Do You Need a Cybersecurity Policy
• The purpose of a cyber security policy is to set procedures and standards to
safeguard user data against malware. Thus, it is important as it prevents
cyberattacks and information breaches.
• Cybersecurity policy provide a roadmap that all the employees of the
organization have to follow in order to ensure the integrity, confidentially
and availability of the data.

What are the different types of security policies?


1. Issue-specific policy: Concerned with functional issues of a system
2. System-specific policy: Associated with a specific computer system
3. Master (Organizational) Policy: An outline of a company’s security program
How to develop a Cybersecurity Policy? 
1. Understand How Security Matters To You
2. Identify And Prioritize Assets, Risks, And Threats (which data you need to
protect)
3. Set Realistic Goals (make sure that your policy can be implemented in
stages, if you can’t implement it in one go. Also, be sure to communicate
your goals to your employees, consumers, and investors.)
4. Do a test run (try attacking your system)

What should a cybersecurity policy include?


• Organization-wide password requirements
• Designated email security measures
• Outline how to handle sensitive data
• Create rules around handling technology
• A plan on how to prepare for a cyber incident

Some example of cybersecurity policies


1.  Acceptable Use of data Systems Policy: The purpose of this policy is to
stipulate the suitable use of computer devices at the corporate/company.
These rules protect the authorized user and therefore the company also.
Inappropriate use exposes the corporate to risks including virus attacks,
compromise of network systems and services, and legal issues.
2. Account Management Policy: The purpose of this policy is to determine a
typical for the creation, administration, use, and removal of accounts that
facilitate access to information and technology resources at the corporate
Serialization is the process of converting object in to sequence of bytes which can be persisted to disk or
database or can be sent through streams. The reverse process of creating object from sequence of byte
is called deserialization.

For serializing the object, we call the writeObject() method


of ObjectOutputStream  class, and for deserialization we call the readObject() method
of ObjectInputStream class.

We must have to implement the Serializable interface for serializing the object.

A java object is serializable if its class or any of its subclass implement java.io.serialzable or its sub
interface java.io.externiolizable interface.
The entire process is jvm independent, meaning an object can be serialized on one plateform and
deserialized on entirely different platform

Notice that for a class to be serialized successfully, two conditions must be met −
 The class must implement the java.io.Serializable interface.
 All of the fields in the class must be serializable. If a field is not serializable, it
must be marked transient.

You might also like