Difference between revisions of "What the Security Is"
(→Script) |
(→Script) |
||
Line 11: | Line 11: | ||
===Script=== | ===Script=== | ||
− | :The [[CNM Cyber Team]] | + | :The [[CNM Cyber Team]] strives to protect both the data and systems of [[CNM Cyber]]. The ''Team'' distinguishes two branches of the security governance. |
− | |||
− | |||
+ | :The policy branch can be compared with the legislative branch of the government. This branch defines policies such as [[privacy policy]], [[backup and recovery policy]], [[user access policy]], [[informational resource management policy]], and [[human resource management policy]] that create sets of security governing rules. These rules serve as the law of the ''CNM Cyber'' land. | ||
+ | :The executive branch executes the policies and | ||
sensitive [[user data]] from unwelcome use conducted by those users who are authorized to access that data. | sensitive [[user data]] from unwelcome use conducted by those users who are authorized to access that data. | ||
Revision as of 20:21, 19 September 2020
What the Security Is (hereinafter, the Lectio) is the lesson part of the Cyber Security Essentials lesson that introduces its participants to CNM Cabin. This lesson belongs to the Introduction to CNM Cyber session of the CNM Cyber Orientation.
Content
The predecessor lectio is What Pipeline Is.
Key terms
- Cyber-security. The practice and a set of concepts based on that practice that are designed to protect computers, data, and networks from potential attacks or unauthorized access.
- Encryption. A method of encoding data so that it is unreadable to parties without a method of decryption.
- SSL certificate. The system document that (a) is issued by a certificate authority (CA), (b) is based on the Secure Sockets Layer (SSL) protocol, and (c) installed on a web server to allow for a secure connection between this web server and any web browser. Contemporary SSL certificates also support the Transport Layer Security (TLS) protocol.
Script
- The CNM Cyber Team strives to protect both the data and systems of CNM Cyber. The Team distinguishes two branches of the security governance.
- The policy branch can be compared with the legislative branch of the government. This branch defines policies such as privacy policy, backup and recovery policy, user access policy, informational resource management policy, and human resource management policy that create sets of security governing rules. These rules serve as the law of the CNM Cyber land.
- The executive branch executes the policies and
sensitive user data from unwelcome use conducted by those users who are authorized to access that data.
- The second is cyber-security, which is protecting computers, data, and networks from potential attacks or unauthorized access.
- To protect web operations of CNM Cyber, all of its website are secured with SSL certificate. So, when you communicate with the Cyber on the Internet, all of the communications are encrypted and practically impossible to capture.
- The CNM Cyber Team is constantly applying new security patches and following security recommendations to protect the software systems from end-user applications and up to computing servers of the Cyber.
- The access to the highest risk areas such as administrative projects of CNM Lab is protected by the public key infrastructure (PKI). This technology is the most secure from all that are available on the market.
User Data in Cyber is the successor lectio.
Questions
Lectio quiz
- The answer is recorded for the lectio completion purpose:
- Would you be interested in working on cyber-security of CNM Cyber? --Yes/No/I'm not sure/Let me think/Let's move on