1/20
Adv Info QuaSsurance
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
NIST Cybersecurity Framework (NIST CSF)
A voluntary framework based on
existing standards, guidelines, and
practices for managing cybersecurity
risk. Widely adopted globally for its
flexible and adaptable nature.
ISO/IEC 27001
An international standard that
provides a systematic approach to
managing sensitive company
information so that it remains
secure. It includes a process for
assessing and treating information security risks.
CIS Critical Security
Controls (CIS Controls)
A prioritized set of actions to protect
organizations and data from known
cyberattack vectors. Developed by a
global community of cybersecurity
experts, focusing on actionable steps.
The National Institute of Standards and Technology (NIST) CSF
offers a flexible, risk-based approach to managing cybersecurity. Its
strength lies in its simplicity and adaptability across various industries and organizational sizes.
NIST 6 framework core functions
Identify
Protect
Detect
Respond
Recover
Govern
ISO/IEC 27001
is the world's leading standard for Information Security Management
Systems (ISMS). It provides a holistic approach, ensuring information is systematically protected through policies, procedures, and controls.
International Organization of Standardization/International Electrotechnical Commission
ISO/IEC stands for
Confidentiality
Integrity
Availability
focus areas of ISO/EIC
Confidentiality
Ensuring information is accessible only to those authorized to
have access.
Integrity
Safeguarding the accuracy and completeness of information and
processing methods.
Availability
Ensuring authorized users have access to information and associated assets when required.
CIS Controls
are a robust set of prioritized, actionable cybersecurity best
practices. They provide a clear roadmap for organizations to improve their
cyber defense, focusing on specific and effective safeguards.
CIS Controls
They serve as a practical, foundational layer for any organization looking to
enhance its security posture, complementing broader frameworks by offering
concrete steps.
CIS Critical Security Controls: Actionable Defense
Inventory & Control of Enterprise Assets
Inventory & Control of Software Assets
Data Protection – Secure sensitive info. (Ex: Encryption)
Secure Configuration of Assets – Harden systems. (Ex: Disable unused ports)
Account Management – Control user accounts. (Ex: Role-based access)
Access Control Management – Enforce least privilege. (Ex: MFA)
Continuous Vulnerability Management
Audit Log Management – Collect & review logs. (Ex: SIEM tools)
Email & Web Browser Protections – Secure gateways. (Ex: Anti-phishing filters)
Malware Defenses – Detect & block malware. (Ex: AV tools)
Data Recovery – Backup & restore data. (Ex: Daily backups)
Network Infrastructure Management – Secure routers, firewalls.
Network Monitoring & Defense – Detect intrusions. (Ex: IDS/IPS)
Security Awareness & Training – Train users. (Ex: Phishing simulations)
Service Provider Management – Vet 3rd-party vendors.
Application Software Security – Secure coding practices.
Incident Response Management – Prepare & test response plan.
Penetration Testing – Simulate attacks to improve defenses.
Republic Act 10175: Cybercrime Prevention Act of 2012
This landmark legislation defines
and penalizes cybercrimes,
including illegal access, data
interference, cyber libel, and cyber
squatting. It also grants law
enforcement agencies specific
powers to investigate and prosecute
cyber offenses.
Republic Act 10173: Data Privacy Act of 2012
A comprehensive law protecting
individual personal information in
information and communications
systems. It sets strict guidelines for
data collection, processing, and
storage, aligning the Philippines
with global data protection
Republic Act 8792: E-Commerce Act of 2000
This act gives legal recognition to electronic
data messages, electronic
documents, and electronic
signatures. It facilitates
e-commerce transactions and
defines specific offenses related to
the misuse of electronic
documents.
SIM Registration Act (RA 11934, 2022)
Mandates registration of all SIM cards to curb text scams and
other mobile-related crimes, improving traceability.
PDCA Model:
Plan – Identify risks, define policies & objectives
Do – Implement controls (access, firewalls, training)
Check – Monitor, audit, review effectiveness
Act – Improve policies & update controls
ISO/IEC 27001 Core Process