Developing-skills-in-cyber-while-in-the-role---final-a11_1022650
Developing-skills-in-cyber-while-in-the-role---final-a11_1022650
The Sociotechnical Security Group (StSG) at UK National Cyber Security Centre advocates
a sociotechnical approach to address cyber security issues.
They claimed that "Traditional approaches to security research have been focused on
understanding technology.
But it's only part of the picture and doesn't account for the interaction of technology with
people, processes and organisations."
Systems Security
Applications Security
Passwords
Computer Security ID Management System
Autherntication
Secure Swicthes
Network Security Intelligence Hubs
Socket Security
Cryptography
Information Security AES, RSA, PGP
SSL/TLS
Firewalls/IDS/IPS
Internet Security Browser Security
Perimeter Security
Server Rooms
Physical Security CCTV
Human Errors
Human Security Social Engineering Attack
All these level requires different Recconaissance
OSINT
security skills
Factors Influence Cyber Security Challenges
Change Delivery
Phishing Channels Identification
Intellectual Property
Session Hijacking Transport
Theft
Evidence
MITM ID Theft
Extraction
security skillsets
Malware/Spyware Diversions Report
Cyber Security Domain
Information
Flows
Data Structures
Security Goal
Security
Requirements
Cyber Security Systems Development
Sampling
Security Questionnaires
• DevSecOps Requirement
Capturing
Interview
Research
Observations
Security Cost
Budgeting
Security Design Security Equipments
Expertise
Security
Cyber Security Verification
Project Systems Implementation
Implementation
Development Security Implementation
Lifecycle
Unit Testing
Integration Testing
Testing Stress Testing
Penetration Testing
Security
Validation
Laptop
DataEncrption
Encryption Key
Work station Internal
AttackMobil SSL External Login Screen
Firewall -User ID Firewall
Digital Deep Packet Application
Deep Packet -Password Web Server
Certificates Inspection Server
Verication Inspection
th
5 Generation 5th Generation
Initiated Fire wall
Fire wall
Threat
Actor
All Cyber Security professionals must have a certain level of cyber
security knowledge required for the:
• different vulnerable spots on the network
• and the attacks that could be deployed implementation phases.
AI in Cyber Security
Integrating AI in Cyber Security
• AI in Cyber Security provides Vulnerability Detection
• AI in Cyber Security provides Cyber Threat Predictive Analytics
• AI in Cyber Security provides Behavioural Analytics
• AI in Cyber Security provides anomaly detections
• AI in Cyber Security provides Malware/Ransomware Detection and
Prevention
• AI in Cyber Security provides Automated Incidence Response
• AI in Cyber Security is able to support Risk Assessment
• AI in Cyber Security is able to detect Phishing and Business Email
Compromise (BEC) Threats
https://www.isc2.org/certifications
Proves you have the foundational knowledge, skills and abilities for an entry- or junior-level cybersecurity role.
Domain 2. Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts
* Earning a post-secondary degree (bachelor’s or master’s) in computer science, information technology (IT) or related fields may satisfy the one year of required experience.
CCSP – Certified Cloud Security
Professional
CLOUD SECURITY
Demonstrates professionals have the advanced technical skills and knowledge to design, manage and secure
data, applications and infrastructure in the cloud.
CISCO Certifications
• Technical Networks and Security
Any Questions