Cybersecurity

Get Started. It's Free
or sign up with your email address
Rocket clouds
Cybersecurity by Mind Map: Cybersecurity

1. Cloud Computing Strategy

2. Threats

2.1. External

2.2. Internal

2.2.1. Threat Intelligence

3. Benefits

3.1. Long term

3.1.1. Reducing Cybercrime

3.1.2. Ciustomer Satistfaction

3.2. Short term

3.2.1. Safegaurding data

3.2.2. Increased search engine rankings

4. Need of cybersecurity

4.1. Confidentiality

4.2. Integrity

4.3. Availibility

4.4. Privacy

4.5. Security

5. Types of cybersecurity

5.1. IT security

5.2. Application security

5.3. Cloud Security

5.4. Network Security

5.5. Critical Infrastructure Security

5.6. Internet of Things Security

6. Challenges

6.1. Cloud Vulnerabilities

6.2. Internet of Things

6.3. Phishing

7. Measures undertaken

7.1. Risk determination

7.1.1. Risk report

7.1.1.1. Threat awareness

7.1.1.2. Standardize IT and cybersecurity capabilities

7.1.1.3. improve incident detection and response capabilities

7.1.1.4. Drive accountability

7.2. Continuous Monitoring

7.2.1. CONTINUOUS DIAGNOSTICS AND MITIGATION (CDM)

7.2.2. NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER (NCCIC)

7.3. Federal Acquisitions

7.3.1. Security Controls

7.3.2. Cyber Incident Reporting

7.3.3. Information System Security Assessments

7.3.4. Information Security Continuous Monitoring

7.3.5. Business Due Diligence

7.4. HVA Process

7.4.1. Plan

7.4.1.1. Stakeholder engagement

7.4.1.2. Business process review

7.4.1.3. Governanace

7.4.1.4. Engagement with third party

7.4.2. Identify

7.4.2.1. Agency specific assessment

7.4.2.2. Threat intelligence

7.4.3. Categorize

7.4.3.1. Determine physical location

7.4.3.2. Determine Key stakeholders

7.4.3.3. Communicate roles

7.4.4. Priortize

7.4.4.1. Risk matrix of threat

7.4.5. Report

7.4.6. Assess

7.4.6.1. Pre-Assessment

7.4.6.1.1. Identify system dependencies and interdependencies

7.4.6.1.2. Conduct security assessments of HVAs

7.4.6.1.3. Appropriate agreements and assessments

7.4.6.2. Assessment

7.4.6.2.1. Risk and Vulnerability Assessment (RVA)

7.4.6.2.2. Security Architecture Review (SAR)

7.4.7. Remediate

7.4.7.1. Remediation Plans

8. Progress update in Australia

8.1. Current Victorian Network

8.2. Future Requirements

8.3. Design for future

8.4. Ernst and Young

8.5. Response to threats and breaches

8.6. Ways to reduce the threats

8.7. Incidents on service

9. State emergency response plan

9.1. Risk and resuilience

9.2. Co-ordination and response

9.3. Relief and recovery

10. Current State Key initiatives

10.1. Managing Cybersecurity Throughout the Enterprise

10.2. Understanding Data Assets and Threats

10.3. Building the Federal Cyber Workforce

10.4. Promoting the Use of Standardized, Centralized IT

10.5. Securing the Network

10.6. Securing Authentication and Authorization – Identity, Credential, and Access Mgmt.