Cyber Security Tutorial

Cyber Security Overview Cyber Security Introduction Cyber Crime Cyber Space Cyber Criminals Cyber Law Cyber Attackers Types of Hackers Functions of Cyber Security Method to Improve Data Security Cyber security frameworks Importance of Cyber Security Types of Cyber Security Cyber Security Fundamentals Applications of cyber security Cyber security in education sector Cyber security in health care industry Cyber security tools Cyber security policies Types of security policies Characteristics of cyber security policies Digital signature Cyber Security Standards NIST- National Institute of Standard and technology Information Technology Act ISO - International Standard for Organization ISO certification PCI DSS Standard FINRA Difference between Information Security and Cyber Security Cyber Security Vulnerability Elements of vulnerability management Social Engineering Vulnerability Assessment Vulnerability management Types of cyber security vulnerabilities Identification of security vulnerability Types of social engineering attacks Penetration Testing Penetration Testing Tools Types of penetration testing Process of Penetration Testing What is Phishing Elements of cyber security Difference between Spoofing and Phishing Difference between Network Security and Cyber Security Difference between Ethical Hacking & Cyber Security Role of artificial engineering in cyber security Cyber Forensics Definition Cyber Security job qualifications Cyber Security Prerequisites Cyber Security Identity and Access Management What is Cyber Forensics Different Types of Cybercrime Different types of cybercrime Tunneling Techniques in Cyber Security

Cyber security policies

Introduction

Security experts design security policies to protect the enterprise, employees, staff, and business from various threats. The written documents consist of planning to protect the company from undesired issues and problems.

In the computer world, cyber security policies are live documents designed to safeguard the working on the internet. These are the standardized procedures and practices designed in a business to protect the network from threat activity.

IT department and C-level executive's main issue is cyber security (how to apply it to employees and other users). Cyber security policies are the plan that protects the company's physical and information technology assets and update with changes in technologies, vulnerabilities, and security requirements change. Cyber security policies are the best method to explain the roles and responsibilities of each person in protecting IT systems and data. Policies are written rules and responsibilities on paper that explain how partners, employees, consultants, board members, partners, and the end-users access internet resources and online applications, send data over the internet and otherwise practice responsible security.

Points to be considered in creating a cyber security policy

While drafting a cyber security policy, the security professional must consider a range of areas:-

  • Data classification- Data handling and categorization are most important for any business as an improper division of data can expose valuable resources. Data classification must be considered by security professionals in drafting the security policy.
  • Continuous updates- As the organization grows, cyber threats evolve, and industrial change, IT environment, and vulnerabilities also grow; therefore, security policy must adapt and reflect these changes.
  • Policy frameworks- The NIST-National Institute of Standards and Technology offers a cyber security framework that guides security policy creation. Policy frameworks help detect, prevent and respond to cyber-attack in a business.
  • Cloud and mobile- While developing cyber security policies, experts should consider how cloud and mobile applications are used because data is distributed over the network, increasing the rate of vulnerabilities. Cloud and mobile applications should be considered in designing security policies.    

Importance of cyber security policies

  • Cyber security policies increase the efficiency
  • Policies uphold accountability and discipline
  • Reason to make a business deal or make it
  • Help in educating employees on security literacy
  • Protect the organization's physical and digital assets

Cyber security policies address some of the information issues

Physical security

Physical security holds many objectives like identifying secure areas, access management, and monitoring. It handles data security at server rooms, data server end-points within the company's offices, and elsewhere.

Data retention

Data retention keeps an eye on what kind of data the company is collecting and processing and the storage (how, where, and for how long data should be stored). Data retention policies directly impact the privacy, compliance, and security areas.

Data encryption

Data encryption is the backbone method of data security, due to which the organization handles the transmission and storage of data. Data encryption policy includes the objectives and rules around key authentication and management.

Access control

Identification and protection of sensitive data from unauthorized access and access control policy decide who can access the sensitive data.

Security training

Security breaches due to human mistakes knowingly harm the organization's growth and development. This issue can be resolved by providing security training to the company's employees and executives. 

Risk management

Risk management in a company handles the risk factor and organization tolerance or risk factor in various departments. It is also responsible for managing who is handling the risk.     

Business continuity

When a threat strikes the business, how does the administration react towards it to protect the assets? Security threats are a great hurdle in business continuity; therefore, a business continuity policy is designed to process and maintain the business's infrastructure used to maintain its continuity.

Security policy structure

Security policy is designed with a structure to make it practical. The main points that should be considered for the structure of security policy are:-

Step 1: Description of the policy.

Step 2: Use of a particular policy.

Step 3: In what area policy should be applied

Step 4: Responsibility and functions should be affected by the policy.

Step 5: Procedures are involved in the policy.

Step 6: What consequences should arise when the policy is not compatible with company standards

Goals of cyber security policies

  • CSP is used to fulfill the CIA triad of information, i.e., confidentiality, integrity, and data authentication.
  • It prevents data from unauthorized access, disclosure, misuse, and theft.
  • CSP is designed to protect the computing resources of an organization.
  • To handle legal issues that arise due to workers or third parties.
  • For maintaining an outline regarding network security for the administration and management of the company.
  • To eliminate the wastage of computing resources in a company.
  • User access rights are differentiated.
  • Illegal and unauthorization of data is prevented.
  • To handle the risk management and risk factors arising from illegal use of system resources.