Sunday, October 6, 2019

Cyber Security Pairing Physical and Digital security

If the defense of the environment in depth attacker have no time to think.
  • OSI Open system interconnection
  • Policy and Procedures
  • Education 
  • Strong password 
  • Gates and fences
  • Checkpoints
  • Supply Management
OSI consists of below layer for Communication:
  • Application layer
  • Presentation layer 
  • Session layer
  • Transport layer 
  • Network layer 
  • Datalink layer 
  • Physical layer
Physical layer comprises of below important points,
  • Identification
  • Data archives
  • Access logs 
  • Man traps
  • Locked  vaults 
  • Fiber
Policy which  are important for cyber security are,
  • Strong password 
  • Classification
  • Job rotation 
  • Tailgating
  • Alarm configuration 
  • Inspections
  • Lock down procedures 
Physical security:
  • Deterrence is a use of threat to prevent an action from bad actor. 
  • Physical security needs to do additional work mutual destruction.
  • Physical security is a barriers and surveillance and security are important in case of cyber security. 
Detection:
Physical security we can ensure security by alarms and sensors, and continuous video surveillance.

Access controls: 
  • Security access controls can be given by multifactor authentication. 
  • Security personnel need to make sure to secure  organisational assets from various hazards. 
Digital Security:
  • Digital security uses threat to bad actors which happen complexity of security. 
  • Digital security detection uses IDS , account monitoring, trend analysis, user logging. 
  • Digital security access can be ensured by blocking Tailgating and shoulder surfing. 
Digital Access Control:
Digital access control are classified based on controls given below,
  • ABAC:Attribute based access control
  • DAC: Discretionary based access control 
  • HBAC:History based access control 
  • MAC:Mandatory access control 
  • OrBAC: organisation based access control 
  • RBAC:Role based access control
  •  RAC: Rule based access control. 
  • IBAC: Identity Based Access Control 
  • RBAC:Responsibility based access Control. 
Digital Security Personnel:
  • Information assurance technical (IAT) 
  • Information assurance management (IAM) 
  • Information assurance system architecture engineering (IASAE) 
  • Computer network defence - service provide (Nd-Sp). 
NIST Framework Core:
  • Securely Provision 
  • Operate and maintain
  • Protect and defend 
  • Investigate collect and operate
  • Analyze
  • Oversight and development 
Integrating Security:
System integration is linking computer, vertical, horizontal, spaghetti, continuous.

Integrating hardware solutions:
Hardware solutions are important for cyber security,
  • Locks
  • Firewall 
  • IDS
  • Hardware Security module 
  • Access hardware 
Integrated software solutions:
Single sign-on tokens and servers
Physical firewall and software firewall

Hill Station view:

1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....