Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTER SECURITY OPERATION (Computer Operation Security (Understanding…
COMPUTER SECURITY OPERATION
Computer Operation Security
Understanding threats and vulnerabilities of computer operation
Operation security associated with everything
To keep a network, computer system, application and environment up and running securely.
Maintenance of an environment and activities day to day basis
high priority to ensure security of information and
Information Technology asset under organization control
Domain is concerned
Threats
Potential event that cause harm by violating security
Vulnerabilities
Weakness in system
Assets
Computing resources & ability
Asset Management
Identify all hardware, software, systems,
and data that support a facility’s information systems.
Asset Management Security Control
Maintain an asset inventory of all systems connected to the network and the network devices
themselves.
An asset inventory is critical as the facility cannot protect unidentified assets.
Common Security Control
Access Control
Designed to ensure that someone without permission to access is restricted
Communications Security
Protection of digital communications
Baseline Configuration Security
Establish and maintain baseline configurations systems (including
hardware, software, firmware, and documentation)
Monitoring & Audit
Security controls address the detection element of security.
Acquire, assess, and take action on new
information.
Identify and mitigate vulnerabilities and minimize the window
of opportunity for attackers.
Threats and Vulnerabilities
The threat is more closely identified with the adversary attempting to gain access
to a system.
Two technology trends that are driving the cyber threat.
Internet of things
Explosion of data
Vulnerabilities
Weakness of an asset or control that can be exploited by one or more threats.
Technical and Non-Technical Vulnerabilities
Security Awareness & Training
To provide personnel facility with the
skills needed to minimize information security risks.
Security training is needed for all functional roles in the facility
The amount of training required varies for the different functional roles.