Trusted answers to developer questions
Trusted Answers to Developer Questions

Related Tags


What are the cyber security principles?

Hifza Sohail

The spread of information technology and the rise in socialization trend has increased the significance of cybersecurity.

What is Cyber Security?

Cybersecurity is the mechanism of protecting and securing information that is stored virtually. It aims to maintain the confidentiality of a user’s information and ensure that only authorized users gain access.

What is the need for defining Cyber Security Principles?

Different organizations have set a diverse range of cybersecurity principles to protect their data from people or any technical domains. These principles are established to guide the organization in protecting information from cyber threats.

How are these principles executed?

Cybersecurity principles usually run in the following manner:

  • The security risks are constantly monitored and identified.
  • The identified risks are analyzed and security protocols and controls are implemented on them.
  • The events of cybersecurity are detected and evaluated.
  • The necessary response is made and the information is recovered from the detected cybersecurity events.

What principles should be established to maintain Cyber Security?

  1. A simplistic security framework should be maintained so that efficient monitoring can be done and easy verification can be performed for the enforcement methods.

  2. There should be an access management system by default that provides full access, but only registered and authorized users. Unauthorized users will only be provided with limited access.

  3. Authorized users should only have access to their concerned department. Whenever a project that a particular user is working on ends, the user’s access to that project should be removed.

  4. There should be defined channels to access shared files for multiple users. This will help in securing data paths.

  5. The lengths and formats of passwords should be defined to reduce the risk of potential attackers creating and guessing the password combinations.

  6. Mechanisms such as Two-Factor verification should be established. This verification is important, not just because it secures things by making them complicated, but because it is necessary to psychologically analyze the potential risks and establish mechanisms to complicate the attacking process.

  7. Internet surveillance cameras should be installed to monitor the activities of the users. This will help when identifying potential attackers.

  8. If a user is logged in for a certain period of time, they need to be re-verified. Users should only be allowed to sign in from the devices provided by the organizations, and cannot work on their personal computers.

  9. Regular security patches should be run to troubleshoot any issues and fix any security breaches that are identified.

  10. The use of secondary storage (i.e., jump drives) should be very limited and policiescan include detailed scanning of the secondary device that is connected and checked for any risk should be defined regard its usage.

  11. The inbound and outbound rules related to networking should be defined so that the firewall only allows restricted access. This will prevent connections to unsecure links.

  12. A response management system should be implemented which acts whenever a security breach is detected. It should monitor all the networks and restrict them accordingly.

  13. A well-functioning anti-virus should be installed to detect malware from the device. The anti-virus should not only detect viruses, but also take the necessary steps to remove them from the endpoints.

  14. The people belonging to the cybersecurity department should be experts in their domain so that the right policies are set and the integrity of the data is maintained.

  15. There should be training programs for the end-users to guide them through the regime of risk management so that policies are correctly followed and users are aware of what will happen if they violate these principles.



View all Courses

Keep Exploring