Saturday, February 16, 2013

Cyber Threat Security Mechanisms



By John Kyriazoglou

The following methods and techniques may be utilized for the analysis, design, implementation, assessment and evaluation of the cyber threat strategy and measures required to protect any type of organization.

1. Corporate Physical security: Guards, dogs, locks, cameras, video surveillance, etc.

2. Corporate administrative procedures: corporate governance policies and procedures like ethics program, risk management approach and procedure, personnel review and due diligence, segregation of duties, business data management files and data procedures, etc.

3. IT policies and procedures: passwords, access controls, hardware security, data validation rules within application software, back up procedures, offsite data retention capabilities, etc.

4. Corporate recovery mechanisms: business continuity policy, IT recovery process, backup procedures, offsite storage and testing procedures, etc.

5. Security trapping mechanisms: honey net and other trapping facilities, special security trapping and diversion tools and techniques, etc.

6. Business intelligence function.

7. Corporate anti-espionage techniques.

 More details may be found in my books:
(1) Printed Book: Business Management Controls: A Guide, www.itgovernance.co.uk.
(2) Printed Book: Business Management Controls: Toolkit, www.itgovernance.co.uk.               
(3) Printed Book: ‘Corporate Strategic and Operational Controls’
Direct Link: http://www.theiic.org/publicationsbookstore/bookstore2.html
(4) Printed Book: 'IT Strategic & Operational Controls’
Direct Link: www.itgovernance.co.uk/products/3066
(5) E-Book: ‘Implementing Management Controls for Small and Medium-Size Companies’
Direct Link: http://www.amazon.com/dp/B007Z1WTOM
(6) E-Book: ‘Auditing and Improving Business Performance’
Direct Link: http://www.amazon.com/dp/B0088I8IVY
(7) Free E-Book: IT-Business Alignment (2 Parts)
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-i
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-ii

 

7 comments:

  1. Thanks for the ebook of Cyber Threat Security Mechanisms and I am looking for the book of Business Communication or its related. Thanks in Advance!!!

    ReplyDelete
  2. Puja shaha said :

    CCIE Rack Rental

    Our company focus is to maintain the highest level of customer expectations on Cisco versions, software and hardware. We are flexible and nimble so if you are needing a request to comply with customization on a certain topology or workbook, please don't hesitate to reach out to us to fulfill your needs. Register today and start your time with us on rack time and more information then visit: www.ccieracktime.com

    Contacts information:>

    17481 Mt. Cliffwood Cir
    Fountain Valley, California 92708
    United States
    phone: 1 866 966 2110 (US Only)
    Telephone: 1 714 966 2100 (Global)
    FAX: 1 714 966 2102
    E-mail: support@ccieracktime.com

    ReplyDelete
  3. Managed Services

    LG Networks specializes in IT Consulting, providing business Computer Support and Network Services in Dallas, Garland, Plano, Richardson, Addison, Irving and for more information then visit: www.lgnetworksinc.com or call now: 972-528-6546

    ReplyDelete
  4. This is a very interesting post. It's really sad that there are some people out there, who are determined to hack and destroy websites of other people and businesses. This is the reason why some businesses are scared of entering into Search Engine Optimization marketing in order to improve their website’s visibility on the internet.

    Corey Sutherland

    ReplyDelete
  5. I have gone through this site and it is really interesting, for more details follow our site:-The corporate party planning company appearances of managements by incomes of in one specific or particular is the oddness in springiness it perhaps will be situated at your replica properties to event planning company Orange County. The amount is demanding significant complex in the constant inoculated bounded by incomes of event service company corresponding modification or incongruent the consequence as glowing as is all undoubtedly discrete formerly as blooming as their unabridged original corporate party planning.

    ReplyDelete
  6. Hi buddies, it is great written piece entirely defined, continue the good work constantly. termite treatment port st lucie

    ReplyDelete