Difference between revisions of "Cyber Security"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
(8 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Cyber security refers to policies, procedures and processes performed by an organisation to ensure that information relevant to them that is stored in cyberspace is preserved regarding their confidentiality, integrity and availability.
 
Related Term: [[Confidentiality|Confidentiality]]; [[Integrity|Integrity]]; [[Availability|Availability]]
 
  
 +
| '''1.''' Cyber security refers to policies, procedures and processes performed by an organisation to ensure that information relevant to them that is stored in cyberspace is preserved regarding their [[Confidentiality|confidentiality]], [[Integrity|integrity]] and [[Availability|availability]].
 +
 +
[[File:Characteristics of Relevant Concepts Diagram.png|thumb|right|300px|'''Cyber Security and Relevant Business Continuity Management Concepts''']]
 +
 +
'''Related Term''': [[Confidentiality|Confidentiality]]; [[Integrity|Integrity]]; [[Availability|Availability]]
 +
{{Template:BLCoursesBanner}}
 
{{Bcm Institute Source}}
 
{{Bcm Institute Source}}
  
 
|}
 
|}
 
+
 
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
+
'''2.''' Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability, Integrity, which may include authenticity and non-repudiation, and Confidentiality (ITU, 2008).<br/> '''Source:''' (Elizabeth, 2016)<br/> <br/> '''3.''' The term cyber security encompasses all the tools, policies, security concepts, security mechanisms, guidelines, risk management methods, actions, training, good practices, guarantees and technologies that can be used to protect the cyber environment and assets of organisations and users. The assets of organisations and users include connected computer devices, staff, infrastructure, applications, services, telecommunications systems and all information sent and/or stored in the cyber environment. Cybersecurity aims to ensure that the assets of organisations and users are secure and remain so against risks affecting cyber environment security.<br/> '''Source:''' (Infocrise, 2016)
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
'''2.''' Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability, Integrity, which may include authenticity and non-repudiation, and Confidentiality (ITU, 2008).<br/> '''Source:''' (Elizabeth, 2016)<br/>  
 
<br>
 
'''3.''' The term cybersecurity encompasses all the tools, policies, security concepts, security mechanisms, guidelines, risk management methods, actions, training, good practices, guarantees and technologies that can be used to protect the cyber environment and assets of organisations and users. The assets of organisations and users include connected computer devices, staff, infrastructure, applications, services, telecommunications systems and all information sent and/or stored in the cyber environment. Cybersecurity aims to ensure that the assets of organisations and users are secure and remain so against risks affecting cyber environment security.<br/> '''Source:''' (Infocrise, 2016)
 
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 02:44, 3 November 2020

1. Cyber security refers to policies, procedures and processes performed by an organisation to ensure that information relevant to them that is stored in cyberspace is preserved regarding their confidentiality, integrity and availability.
Cyber Security and Relevant Business Continuity Management Concepts

Related Term: Confidentiality; Integrity; Availability

(Source: Business Continuity Management Institute - BCM Institute)

 

2. Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability, Integrity, which may include authenticity and non-repudiation, and Confidentiality (ITU, 2008).
Source: (Elizabeth, 2016)

3. The term cyber security encompasses all the tools, policies, security concepts, security mechanisms, guidelines, risk management methods, actions, training, good practices, guarantees and technologies that can be used to protect the cyber environment and assets of organisations and users. The assets of organisations and users include connected computer devices, staff, infrastructure, applications, services, telecommunications systems and all information sent and/or stored in the cyber environment. Cybersecurity aims to ensure that the assets of organisations and users are secure and remain so against risks affecting cyber environment security.
Source: (Infocrise, 2016)