Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Cyber Security Plan 1

Structure of a Cyber Security Plan

Structure of a Cyber Security Plan

  • A cyber security plan will identify how we will prevent ourselves from being affected by the threats identified in our risk analysis.

  • For each protection measure you should include:
  • Threat(s) addressed by the protection measure
  • Action(s) to be taken
  • Reasons for the action(s)
  • Overview of technical and financial constraints
  • Overview of legal responsibilities
  • Overview of usability of the system
  • Outline cost-benefit
  • Test plan

Cyber Security Protection Measures

Cyber Security Protection Measures

  • To complete the first three sections of the cyber security plan we need to have a strong understanding of:
  • How different protection measures function/are implemented
  • What threats these measures will protect us from

  • We looked at these measures in earlier lessons but will summarise them now.

Hardware / Software Measures

  • Hardware Measures
  • Hardware Firewalls - protects network from DoS, malware & hackers.
  • Routers - can segment network and allow for VPN on all traffic.
  • Wireless Access Points - can be configured for better security. E.g. WPA2.

  • Software Measures
  • Anti-Malware - prevents malware from infecting & damaging systems.
  • Software Firewalls - prevents unauthorised access to a computer.
  • Port Scanning - detects open ports that can exploited by hacker or malware.
  • Access Rights - Limits the impact a malicious user can cause.
  • Information Availability - safeguards to limit effects of data loss. E.g. RAID.

Physical / Alternative Measures

  • Physical Measures
  • Locks - prevents physical access to devices, such as for theft.
  • CCTV - dissuades malicious users from physically accessing devices.
  • Alarm Systems - alerts security in case of unauthorised access to equipment.
  • Backups - ensures recovery from any threat that harms data, e.g. malware.

  • Alternative Risk Measures
  • Risk Transfer - vulnerable activity outsourced, e.g. handling bank details.
  • Risk Avoidance - vulnerable activity not performed, alternative found.
  • Risk Acceptance - threat accepted as risk is low.
Learn more about creating dynamic, engaging presentations with Prezi