Professional Documents
Culture Documents
that occur in cyberspace, such as phishing, Cybersecurity Information Security organization’s information, whether that is digital
hacking, and malware. These attacks target data, or analog. This usually means controlling access,
storage, and devices most frequently. The effort disclosures, and disruption. Think of it as the
of cybersecurity is to safeguard all of your digital, foundation of creating safeguards around the
connected systems, which can mean actively data and information that is essential to your
combatting the attacks that target your operation through the use of tools such as
operation. encryption, two-factor authentication, and facial
scans.
Information technology is a term that Information security deals with security issues
encompasses all of the technology and devices Information technology Information Security around your data to make sure it is protected from
that you use in the course of your operation. potential attacks.
Av
ty ail
ici a bi
e nt lit
y
th Minimize the risk of security
Au Outline Security Objectives
breaches
Inte
Non ion
diat
grit
iality
Confident-
Considerations
Applicable Included Learn from Communication Training Measure,
Assessment Regulations and Review, &
Elements others Plans Objectives
Legal Update
Assess risks: Regulation and Regulation and Learn from Communication Training Plan: Metrics and
Legal: Legal: others: Plan: Updates:
focus on data, How is the policy
process, people, What regulations What regulations Research what How is the policy to be What KPIs and
and and legal and legal others have to be disseminated to Measures are
infrastructure, constraints need constraints need written, look for disseminated to the relevant reviewed.
determine to be followed. to be followed. commonality and the relevant parties Define the
sensitivity and applicability parties Update process
impact
Establish
Access to Data Identify Data Classify Usage Monitor
Protections
Establish
Access Controls Identify Access Monitor
Controls
Non-repudiation
Incidence Incident Management
response and and Response
Guidelines