Section 2 Cybersecurity Concept
Topic 1 Risk
Why a risk oriented approach?
Using risk based approach to cybersecurity allows informed decision -making, better
protection, and effective application of bdgets and resources.
Approaches To Cybersecurity Risk
-Ad hoc : this approach simply implements security with no particular
-Compliance Based : relies on regulations or standards to determine security
implementations.
-RIsk Based
Key Terms and Definition
-Asset
-Treat Event
-Threat Event
-Vulnerability
-Inherent risk
-Residual Risk
Understanding likelihood
-Measures of frequency of event occurrence
Framing Risk Management (PPT)
Risk Scenario (PPT)
- Description of a possible event whose occurrence will have an uncertain impact on
the achievement of the enterprise objectives, which may be positive or negative
Influencing Risk Factors (PPT)
Third Party Risk
-Dapat memunculkan risiko juga, because have different security cultures and risk
tolerances
-Outsourcing and mergers and acquisitions can introduce securiy challenges
-These arrangements can present risk that may be difficult to quantify pottentially
difficult to mitigate
-Security strategy should consider all third party arrangmenets with care to ensure
alignment with internal cybersecurity standards
Topic 2 Common Attack Types & Vectors
-Common Threat Agents (PPT)
-Attack Attributes : Activity by a threat agent (pr adversary) against an asset.
-Attack vector -> Payload -> Exploit -> Vulnerability -> Target (Asset)
-Attack vectors ada dua
 -ingress : focus on intrusion or hacking into systems
 -egress : designed to remove data from systems and network
-Threat process (PPT)
-Adversial Attack : result of adversial activity
-NonAdversial Threat Event : not result of adversial activity (Natural hazard,
mishandling,disk errors)
Topic 3
Poicies and procedures
-Specify requirements
-Define the rolse and responsibilities within the organization
-Outline
Policy lifecycle
Create
Approved
Review
Update
Compliace document
-Policies : Communicate required and prohibted acitvities and behaviors
-Standards : Interpret policies in specific situatuins
-Procedures : Provide details on how to comply with policies and standards
-Guidelines : Proovide general guidance on issues such as "what to do in particular
circumstances" There are not requierements to be met, but are strongly recomended.
Cobit 5 information security policy set (PPT)
Type of security poliiy
-Access control policy : provides proper access to internal and external
stakeholders to accomplish business goals.
-Pesonnel information security policy
-Security incident response policy