Cyber Security - Lecture 5
Cyber Security - Lecture 5
Lecture # 05
Instructor: Mr. Sharjeel Ahmed
Slide Elements
• Developing Security Policy
• Deploy and manage Security settings
• Security Through Design
DEVELOPING
SECURITY POLICY
Developing Security Policy
• Developing a security policy is crucial for any organization to establish
guidelines, procedures, and best practices that ensure the protection of its
information assets, systems, and networks.
• It provides a clear framework for security measures and ensures that
everyone in the organization understands their role in maintaining a secure
environment.
1. Define the Scope: Begin by defining the scope of your security policy. What
assets and information are you seeking to protect? Identify the critical
systems and data that require safeguarding.
4. Set Objectives and Goals: Clearly define the objectives and goals of your
security policy. What do you want to achieve with this policy? What are the
desired security outcomes?
10. Approval and Adoption: Seek approval from senior management and other
relevant stakeholders. Once approved, disseminate the policy to all
employees and ensure they understand its contents.
14. Testing and Drills: Conduct regular security testing, such as penetration
testing and vulnerability assessments, and simulate security incidents to
ensure the effectiveness of the policy and response procedures.
• Regularly review and adapt your security measures to address new threats
and vulnerabilities as they emerge.
2. Conduct a Risk Assessment: Assess the potential risks and threats to your
organization's assets and data. Understand the vulnerabilities and potential
impact of security breaches.
9. Incident Response Plan: Create an incident response plan that outlines the
steps to be taken in the event of a security breach or incident. Ensure that
employees are familiar with the plan and know how to report incidents.
10. Monitoring and Auditing: Set up monitoring and auditing tools to detect
and respond to suspicious activities in real-time. Regularly review logs and
audit trails to identify security issues.
11. Data Backups and Recovery: Implement a robust data backup and
recovery strategy to ensure that critical data can be restored in the event of
data loss or ransomware attacks.
Deploy and manage Security settings (Cont. )
12. Vendor Security: Ensure that third-party vendors and partners follow adequate
security practices. This includes due diligence in selecting vendors and periodic
security assessments.
14. Compliance and Regulations: Ensure that your security settings and practices
align with relevant industry regulations and compliance standards, such as
GDPR, HIPAA, or PCI DSS.
15. Continuous Improvement: Regularly review and update security settings and
measures to adapt to evolving threats and emerging technologies.
16. Response and Recovery: In the event of a security incident, follow your incident
response plan to mitigate damage, identify the source of the attack, and take
corrective actions.
SECURITY THROUGH DESIGN
Security Through Design
• Security Through Design, often referred to as "Security by Design"
or "Security by Design and by Default," is a concept in cyber-security
and software development that emphasizes integrating security
measures and considerations into the design and development of
systems, applications, and products from the outset.
10. Incident Response Plan: - Develop an incident response plan to guide the
organization's response to security incidents. Ensure that all stakeholders
understand their roles and responsibilities.
14. Regular Updates: - Continuously monitor and update the security measures
as new threats and vulnerabilities emerge. Keep all software and systems up
to date with security patches.
15. Compliance and Regulation: - Ensure that the design aligns with relevant
industry regulations and compliance standards.
• The weakest link in most businesses is the user, who may download
software, reuse passwords or just receive viruses hidden in phishing
scam emails.
• Making sure that staff know how to use their internet facilities, how to
spot scams and how often passwords have to be updated and how
complex these should be is crucial.
• This is helped by implementing the principle of least privilege, which
means that a user has the minimum set of privileges to perform any
specific task, including administrative privileges, so only an
administrator can download tasks or empowers users for specific
tasks.
• Solid and regularly updated training for all staff is essential for solid
security.
Security Through Design - Principles
3. Defence in depth