Laws that affect Technology and Cybersecurity Requirements

Threats to applications can include the following:

Unauthorized access to data centres, computer rooms, and wiring closets
Server downtime for maintenance purposes
Network operating system software vulnerability
Unauthorized access to systems
Data loss
Downtime of IT systems for an extended period
Client/server or web application development vulnerabilities
The correct answers are: data loss, unauthorized access

Protecting Cybersecurity Domains of Network Infrastructure

Technologies, processes and procedures are used by cybersecurity professionals to defend the systems, devices, and data that make up the network infrastructure. Endpoint security includes securing the network infrastructure devices on the local-area network (LAN) and end systems, such as workstations, servers, IP phones, and access points.

A centralized patch management system can speed up deployment of patches and automate the process. Other good reasons and benefits to using an automated patch update service include the following:

Ensuring Integrity is an Art

Integrity ensures that data remains unchanged and trustworthy. It is therefore an art to maintain the design, implementation and usage of any system that stores, processes, or transmits data. 

How do we create a digital signature? A code signing is a method of verifying code integrity. Digital signatures and certificates incorporates the data integrity controls to provide users a way of verifying the authenticity of messages and documents.

The the step by step process for creating a digital signature must take the following steps.

Cybersecurity Threats, Vulnerabilities, and Attacks

What are the threats or vulnerabilities that lead to a cyber attack? A threat is the possibility that a harmful event and a vulnerability is a weakness. What is an attack? An attack is a deliberate exploitation of a discovered weakness in computer information systems. This could be a unpatched systems or systems missing virus and spam detection.

Threats

Who are the Cyber Criminals?

Who are the Cyber Criminals? There are three main cyber criminals or attacker they are Amateurs, Hackers and Organized Hackers. Data and information are their prized currency.

Amateurs Script kiddies is a term used to describe inexperienced hackers.

Hackers white hat hacker, black hat hacker, and gray hat hacker

Organized Hackers

These criminals include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers

Cyber Criminal Motives

Working as a Team, Integration and Security

Looking at team working, the impact on colleagues and conflicts within the work place.

Team working and integration (security digital transformation and cloud based tools)

Most personal work independently but within a team, group or department
A team is a small group of people with complementary skills, committed to a common purpose
Payroll, Accounts department and the Production team

or

DevOps, networking,  software developer and web team