Introduction: Protection from Cyber Attacks
Get an overview of protecting an organization from cyber attacks.
We'll cover the following
“We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.” – James Clapper, Director of National Intelligence
Ideas to formulate a security program
This chapter discusses the various solutions, controls, and processes that an information security team can use to help protect an organization from cyber attacks. The goal is to provide options whose implementation supports the foundation of an effective security program. Though new solutions are continually being developed to combat ever-evolving threats, this section focuses on core solutions that address most attacks that a typical organization regularly faces.
Maturity levels applied
The following items also have maturity level indicators. These are based on the resources and expertise required to implement the respective controls and how fundamental they are to an InfoSec program. If an organization is just starting to build an information security department, they should begin at level 1. As the program improves and matures, levels 2 and 3 become more appropriate.
Get hands-on with 1200+ tech skills courses.