Officially, ISO/IEC 27032 addresses “Cybersecurity” or
“Cyberspace security”, defined as the “preservation of confidentiality,
integrity and availability of information in the Cyberspace”. In turn “the
Cyberspace” (complete with definite article) is defined as “the complex
environment resulting from the interaction of people, software and services on
the Internet by means of technology devices and networks connected to it, which
does not exist in any physical form”.
source
Cybersecurity Framework – a set of industry standards and
best practices to help organizations manage cybersecurity risks. The resulting
Framework, created through collaboration between government and the private
sector, uses a common language to address and manage cybersecurity risk in a
cost-effective way based on business needs without placing additional
regulatory requirements on businesses.
Implementing Cyber Security
1. Complying with Regulatory Authority Guidelines like
- APRA(Australian Prudential Regulation Authority)
- OAIC(Office of the Australian Information Commissioner)
- ASIC(Australian Securities and Investments Commission)
- International Standards Organisation
2. Identifying Risks
- Data Loss
- Fraud
- Business Disruption
3. Adoption of Information Security Control
- Information lifecycle management
- DataQuality
- Privacy & Data Protection
4. Information Handling
- Nomenclature
- Access
- Distribution
- Storage
- Disposal
- Retention
- Sanitisation
5. Application and uses of Information systems
- Appropriate use
- Disclousre
- Password Saftey
- Electronic Communication
- Remote Access
- Use of Hardware and Software
- Security Incidents
6. Implement User Access Controls
- Disabling
- Emergency Accounts
- Privileged Accounts
- Federation & Trust
- Identify
- Remediate
- Review
- Passwords
- Prevent Brute force
- Timeouts
- Approved encryption methods
- Using Encryption
- Using keys
- Storage of keys
- Perimeter Security
- Physical access
- Fire,Flood, Power protection
- Facilities disaster recovery
- Physical security control equipment
- Equipment Management & removal
- Changement Management
- Security life cycle development process
- Speration of environments between production and non production
- Operational readiness
- Virus/Malware protection
- Resourcing
- Backup
- Vulnerbaility Management
- Audit,logging& Monitoring
- Monitor data/information transfer
- Monitor network connection
- Block non business websites
- Agreements
- Non disclosure Agreements
- RACI
- Risk assessment
- Incident management
- Reporting
- Root cause analysis
17. Implement Cyber Security Strategy
- Identity or Identities
- Cyber Saftey
- Application Security
- Governance
- Data Security
- Cloud Security
- Workplace and Mobility
Cyber Security Tools
1. Antivirus
- Mcafee
- symantec
- Trend Micro
- AVG
- Fireeye
- Websense
- Kaseya Network Monitor
- Akamai Prolexic Routed
- Cisco Sourcefire
- Splunk
- RSA netwitness
- Arcsight
- Fireeye threat analytic platform
- Mandiant
5. Cybercrime prevention tools
- phisingbox.com
- phishme

No comments:
Post a Comment