IT NS 1 - Chapter 1c Operational Issues
IT NS 1 - Chapter 1c Operational Issues
IT NS 1 - Chapter 1c Operational Issues
CHALLENGES
Chapter I
Introduction to Cybersecurity – Part 3
Introduction
Cybersecurity is a critical issue that affects both individuals and organizations
alike. With the increasing amount of sensitive data being stored and transmitted
electronically, it is essential to maintain robust cybersecurity measures to protect against
cyber-attacks, data breaches, and other malicious activities. However, cybersecurity
measures alone are not enough to protect against these threats. It is also important for
individuals and organizations to be aware of the risks and take proactive steps to prevent
and mitigate them. In this context, cybersecurity awareness plays a crucial role in
promoting safe online behavior and ensuring the security of information systems and data.
Learning Outcome
At the end of the unit, the student should be able to:
Explain the principles of confidentiality, integrity, and availability in cybersecurity
Define the different types of cyber-attacks
Analyze the different risk management frameworks and their application in
cybersecurity.
Learning Content
Operational issues in cybersecurity are critical concerns for organizations of all sizes and types.
These issues encompass a broad range of topics, including configuration management,
vulnerability management, access management, incident response, compliance, monitoring and
logging, patch management, network security, endpoint security, cloud security, identity and
access management, data protection, physical security, third-party risk management, and
security operations center (SOC) management. Each of these areas requires careful planning,
management, and execution to ensure that an organization's systems and data are protected
from cyber threats. With the increasing frequency and severity of cyber attacks, it is more
important than ever for organizations to prioritize operational issues in cybersecurity and develop
effective strategies for mitigating these risks.
3. Access Management: Access management is the process of controlling who has access
to what resources within an organization. This includes managing user accounts and
permissions, as well as ensuring that sensitive data is protected through the use of
encryption and other security measures.
6. Monitoring and Logging: Monitoring and logging are critical components of cybersecurity
operations. This includes monitoring for suspicious activity, tracking user behavior, and
maintaining comprehensive logs that can be used for forensic analysis in the event of a
security incident.
These are just a few of the operational issues that organizations must address to maintain
effective cybersecurity. Other issues may include network segmentation, data backup and
recovery, and security awareness training for employees.
3. Cloud Security: With the increasing adoption of cloud computing, cloud security has
become a critical operational issue in cybersecurity. This includes ensuring that cloud-
based data and applications are properly secured, as well as implementing appropriate
access controls and encryption measures.
4. Identity and Access Management: Identity and access management (IAM) involves
managing the identities and access permissions of users within an organization. This
includes implementing strong authentication measures, such as multi-factor
authentication, and monitoring user activity to detect unauthorized access attempts.
5. Data Protection: Data protection involves implementing measures to protect sensitive data
from unauthorized access, such as encryption, access controls, and data loss prevention
technologies.
6. Physical Security: Physical security involves protecting the organization's physical assets,
such as servers, data centers, and other critical infrastructure, from theft, vandalism, and
other physical threats.
7. Third-Party Risk Management: Many organizations rely on third-party vendors for various
services, such as cloud hosting or software development. Third-party risk management
involves assessing the security posture of these vendors and ensuring that they meet the
organization's security standards.
In conclusion, operational issues in cybersecurity are complex and multifaceted challenges that
organizations must address to ensure the security of their systems and data. These issues
encompass a wide range of topics, from configuration and vulnerability management to access
control and incident response. As cyber threats continue to evolve and become more
sophisticated, it is essential for organizations to prioritize these operational issues and implement
robust security measures to protect against cyber attacks. By addressing these operational issues
through a comprehensive and proactive approach, organizations can help minimize the risk of
cyber incidents and ensure the confidentiality, integrity, and availability of their critical systems
and data.
Face to Face
Classroom discussion
Assessment activities
Hands-on activities
Online (synchronous)
Zoom Meeting as scheduled
Messenger Application
Remote (asynchronous)
Schoology Application. Instructions can be viewed at www.erickabuzo.com/class
Printed Module
Assessment Task
Login to your Schoology app in your computer or phone and take the online
activity, orcontact me if you have problems in taking the online activity.
References
Smith, T. J. (2021). Cybersecurity Operations Handbook (2nd ed.). Auerbach
Publications.
Willshere, L., & Abouelmehdi, K. (Eds.). (2019). Cyber Security: Threats and
Operational Challenges (1st ed.). Springer International Publishing.