Saturday, February 16, 2013

Cyber Threat Security Mechanisms



By John Kyriazoglou

The following methods and techniques may be utilized for the analysis, design, implementation, assessment and evaluation of the cyber threat strategy and measures required to protect any type of organization.

1. Corporate Physical security: Guards, dogs, locks, cameras, video surveillance, etc.

2. Corporate administrative procedures: corporate governance policies and procedures like ethics program, risk management approach and procedure, personnel review and due diligence, segregation of duties, business data management files and data procedures, etc.

3. IT policies and procedures: passwords, access controls, hardware security, data validation rules within application software, back up procedures, offsite data retention capabilities, etc.

4. Corporate recovery mechanisms: business continuity policy, IT recovery process, backup procedures, offsite storage and testing procedures, etc.

5. Security trapping mechanisms: honey net and other trapping facilities, special security trapping and diversion tools and techniques, etc.

6. Business intelligence function.

7. Corporate anti-espionage techniques.

 More details may be found in my books:
(1) Printed Book: Business Management Controls: A Guide, www.itgovernance.co.uk.
(2) Printed Book: Business Management Controls: Toolkit, www.itgovernance.co.uk.               
(3) Printed Book: ‘Corporate Strategic and Operational Controls’
Direct Link: http://www.theiic.org/publicationsbookstore/bookstore2.html
(4) Printed Book: 'IT Strategic & Operational Controls’
Direct Link: www.itgovernance.co.uk/products/3066
(5) E-Book: ‘Implementing Management Controls for Small and Medium-Size Companies’
Direct Link: http://www.amazon.com/dp/B007Z1WTOM
(6) E-Book: ‘Auditing and Improving Business Performance’
Direct Link: http://www.amazon.com/dp/B0088I8IVY
(7) Free E-Book: IT-Business Alignment (2 Parts)
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-i
http://bookboon.com/en/business-ebooks/it/it-business-alignment-part-ii

 

8 comments:

  1. Thanks for the ebook of Cyber Threat Security Mechanisms and I am looking for the book of Business Communication or its related. Thanks in Advance!!!

    ReplyDelete
  2. Managed Services

    LG Networks specializes in IT Consulting, providing business Computer Support and Network Services in Dallas, Garland, Plano, Richardson, Addison, Irving and for more information then visit: www.lgnetworksinc.com or call now: 972-528-6546

    ReplyDelete
  3. This is a very interesting post. It's really sad that there are some people out there, who are determined to hack and destroy websites of other people and businesses. This is the reason why some businesses are scared of entering into Search Engine Optimization marketing in order to improve their website’s visibility on the internet.

    Corey Sutherland

    ReplyDelete
  4. Hi buddies, it is great written piece entirely defined, continue the good work constantly. termite treatment port st lucie

    ReplyDelete
  5. Hi. I would like to recommend you microsoft ax - ax-dynamics.com. If you're interested in financial management, you should really try this one! ;)

    ReplyDelete
  6. Each year, more Ganga music and more people are coming down with allergies from a number of different sources. Whatever your case may be, hopefully, Ganga bhakti

    ReplyDelete