Data in process
Technology
Education, Awareness, and Training
Policies and Procedures
ISO Cybersecurity Model
100

What is data in process?

data is collected and translated into usable information.

100

What is cloud-based technologies, and mention its services?

the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence 

There are three main cloud-computing services:

  • Software as a Service (SaaS)
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
100


What is education awareness and training in organizations, its importance, and execution?



enable employees to learn precise skills or knowledge to improve performance.

100

Why is a security policy important?

they protect an organizations' assets, both physical and digital.

100

What is ISO and IEC? And Explain ISO 27000 standards.

ISO (International Organization for Standardization) IEC (International Electrotechnical Commission) 

ISO 27000 a broad range of information security standards published by both the International organisation for Standardisation and International Electrotechnical Commission.

200

From where does the protection of data integrity start?

The protection of data integrity starts from the initial input of data.

200

What is network-based technologies? Differentiate the working of VPN and NAC?

  • Following are the network-based technologies:
    • Virtual Private Networks (VPNs)
    • Network Access Control (NAC)
    • Wireless Access Point Security
  • VPNs use a public network (the Internet) that is utilized by a secure virtual network. The encryption of packet content between the endpoints that make up a VPN ensures its security.
  • NAC requires a series of verifications prior to permitting a device to join a network. Regular checks involve making sure your antivirus software is up to date and that your operating system and applications are updated.
200

Examples of how cybersecurity awareness can be done?

For instance, a lot of companies hold cybersecurity awareness days. Signage and banners can be displayed by organizations to raise awareness of cybersecurity in general

200

What does a security policy involve? Also explain the use of the procedure document?

defines what you want to protect and what you expect of your system users. 

Procedure documents are essential for large businesses to maintain the development uniformity required for a secure environment.  

200

What is the next level of ISO/IEC 27000 and how does it works?

The ISO/IEC 27002 standard is the next step up from the ISO/IEC 27000 standards. 

ISO 27002 provides guidance on the selection, implementation and management of controls required to achieve the objectives of ISO 27001.

300

When does data corruption occur?

during writing, reading, storage, transmission, or processing

300

What are technologies in hardware? Also, differentiate between IDS and IPS?

Computer hardware technology is a hands-on field that involves the design, testing and installation of a variety of computer hardware components

An IDS is designed to only provide an alert about a potential incident, which enables a security operations center (SOC) 

 IPS, on the other hand, takes action itself to block the attempted intrusion or otherwise remediate the incident.


300

What are the elements in a cybersecurity awareness program?

  • Security 101 training. 
  • Password management. 
  • Data privacy policies.

 

300

What does an in-depth security policy include?

Broadly speaking, defense-in-depth use cases can be broken down into user protection scenarios and network security scenarios.

300

What are control objectives and its relationship with SOA?

SoA outlines which of the standard Annex A ISO 27001 controls apply to your organization. 

400

What is data modification, and list the examples of its process?

changing existing data values or the data itself. 

for example

  • Encoding/Decoding
  • Compression/Decompression
  • Encryption/Decryption
400

Explain software firewalls? Difference between network/port scanner and vulnerability scanner?

A software firewall is typically installed directly onto individual devices such as computers, laptops, or servers.

Network scanning is a process that identifies a list of active hosts on a network and maps them to their IP addresses, which need to be compiled before running a port scan. 

A vulnerability scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities.  

400

What are the practices involved in the awareness program?

Employee Training, Policy Development, Phishing and Social Engineering, Technical Measures and Incident Response.

400

Explain different types of policies?

  • Identification and authentication policies
  • Password policies
  • Acceptable use policies
  • Remote access policies
  • Network maintenance policies
  • Incident handling policies
400

Difference between ISO and IEC?

SO standards cover a broad range of topics, IEC standards are specific to electrical and electronic technologies.

500

What is the requirement for protecting data in process and examples of how you can protect?

implement robust network security controls

for example

  • Access Control
  • Data Validation
  • Data Backups
500

What is software safeguard, and what technology is it used?

safeguards applications, systems, and data from unauthorized access and threats.

using strong and secure passwords, auto log out, firewalls, intrusion detection and antivirus software, and adequate encryption.

500

What are the ways to implement a formal training program?

  1. Establish goals for your training program.
  2. Build an employee training plan.
  3. Create employee training content.
  4. Track and improve – Cultivate your content.
500

What is AUP? Also mention organization best practices for cybersecurity?

 acceptable use policy 

  • National Institute of Standards and Technology (NIST) Computer Security Resource Center
  • National Security Agency (NSA) Security Configuration Guides
  • The Common Criteria standard
500

What are different groups in the organization responsible for data?

Responsibility for data management and governance in organizations is shared among key groups: the Data Governance Team ensures strategy and compliance, IT manages infrastructure and security, Data Management Teams handle daily operations, Analytics/BI Teams derive insights, Data Owners/Stewards ensure accuracy and compliance, Compliance/Legal Teams manage regulations, Data Security Teams protect against breaches, Business Units/Departments provide input on requirements, and Executive leadership sets strategy. Collaboration among these groups is crucial for effective data management.

M
e
n
u