Cyber Security Framework

preview_player
Показать описание
Dr. Mardhani Riasetiawan
Рекомендации по теме
Комментарии
Автор

having a good recovery plan is a part of having a good cyber security

teukumuhammadrifqi
Автор

A speedy recovery is definitely more important to businesses and corporations especially in this day and age where access to tools and such are easily found and used. It is thus vital for these businesses and corporations to figure out what was or can be attacked, the impact of said attack, how long the recovery takes, when the last backup was made and what recovery process to undergo.

muhammadgilandmaulana
Автор

you explained the type of cyber threats really well. awesome content and i definitely learnt a lot

chandradzaki
Автор

Beberapa klasifikasi attack vector sangat menarik dan menambah pengetahuan. Paradigma mitigasi yang baru lebih lengkap dan jelas, parameter keberhasilan mitigasi juga sangat jelas.

bintangbahy
Автор

After we understand the Plan and Manage procedure, we'll have to identify and classify the type of attack which will be used to predict the appearance of future threats. There are several types of cyber attacks, such as Persistence/Dormant Malware, Data Wiping/Data Destruction, Data Locking, and Data Theft; these are high probability attack types.
Cybersecurity also has a specific framework to handle such situations, it's actually the developed version of Restore and Recover as it's faster and more responsive. The framework involves Identity, Protect, Detect, Respond, and Recover. As there are types of cyber attacks, there are also several parameters of recovery such as time, point, process, and etc.

queenejdelmarva
Автор

Precautious measures against a threat to system is important especially in knowing the attacks and its character. Thus, recovery in data and key components of a system, its time and effectiveness in minimizing data loss.

ariframadhan
Автор

The classification of attacks through Attack Vectors allows us to become more alert in dealing with cyber attacks; The main purpose is to preemptively identify the type of attack, such that when the actual cyber attack occurs, we will already have actions to isolate and prevent it, as well as have a reasonable timeline of the recovery period - in this case, backups can also prove to be essential just to retrieve all our affected data and systems.

rizkiajiputro
Автор

In knowing the types of attacks that get employed in cybersecurity attacks, security engineers need to know several criteria of attacks. These may include attack vectors, its examples, and its tiering in dangerousness. These attacks usually probe infrastructures for weakness, from which attacks will be done and spread out to other things as well. Things such as data modification and destruction will happen from these attacks, therefore it is important for engineers to keep these infrastructures secure. Here is the usual framework in keeping systems both secure and recoverable: Identify, Protect, Detect, Respond, and Recover.

alvinjanuar
Автор

Melalui video ini, saya menjadi tahu tentang jenis-jenis serangan, pentingnya perkembangan sistem keamanan untuk mengantisipasi metode serangan-serangan baru - meskipun klasifikasi penyerangannya sama - dan perpindahan paradigma dari disaster recovery ke cyber recovery.

kevinsusilosusilo
Автор

Mengidentifikasi jenis serangan lalu melakukan klasifikasi serangan agar bisa memprediksi kemunculan serangan berikutnya.

perdokurniawan
Автор

Sangat penting jika kita menanggulangi serangan siber dengan memperhatikan pola serangan yang sering digunakan dan seberapa sering terjadinya serangan siber

fransiskusricardo
Автор

Melalui video, saya mendapat informasi mengenai tipe-tipe serangan siber, framework dari cyber recovery dan parameter yang perlu diperhatikan.

marfelixfernaldyangsari
Автор

Identifikasi jenis serangan dan mengklasifikasikan serangan tersebut untuk memprediksi kemunculan serangan berikutnya merupakan dua hal yang paling penting.
Framework yang digunakan untuk Cyber Recovery merupakan turunan dari empat langkah prosedur standar Plan and Manage dengan tambahan pada langkah Recover menjadi lebih rinci.

widadabidarahmah
Автор

Berbicara soal cyber security framework, jadi tahu beberapa parameter untuk melakukan proses recovery dan sangat penting untuk menjaga kualitas dan konsistensi terhadap waktu yang digunakan. Framework security juga dibuat atau didesain sebagai salah satu prosedur apa yang harus selanjutnya dilakukan jika terjadi serangan. Seorang auditor juga harus memahami framework dari cyber security.

annisatitiramadhani
Автор

Parameter penting pada recovery harus diperhatikan sehingga tidak serta merta langsung melakukan recovery tetapi harus dengan menjaga kualitas dan presistence dengan waktu.

alimahfudmahfud
Автор

Penjelasan mengenai parameter parameter yang harus ditelaah sebelum melakukan recovery sangat baik, salah satu hal yang sering terlewat saat sistem terkena serangan

ganjarparikesit
Автор

Klasifikasi serangan melalui attack vector dan beberapa contoh-contoh serangan sangat menarik, karena dengan mengetahui dan mengidentifikasi jenis serangan, kita menjadi tidak kaget jika terjadi serangan siber, karena sudah tau bagaimana penanggulangannya dan apa yang harus dilakukan.

ahmadhusain
Автор

In terms of recovery after Attacks, in cybersecurity the main focus would be the recovery time which is crucial in assessing which data is lost and which is still useable, for companies this is very important due to the fact they have their own systematic schedule, which could be hinder their activitites if the recovery time were to take a substantial amount of time.

fadelthariqgifari
Автор

dengan framework, cybersecurity melibatkan banyak sekali pihak untuk terlibat. termakasih penjelasannya. (y)

awik
Автор

Video ini mengajarkan saya bagaimana mengidentifikasi serangan cyber dan klasifikasi kemunculan berikutnya, serta memberikan tingkat resiko dari serangan cyber agar kita lebih mengenal dan mempersiapkan diri dalam mencegah dan menanggulangi ancaman cyber yang sama. Mengetahui paradigma baru yang digunakan untuk memberikan pengarahan kepada kita tentang apa yang harus kita lakukan jika terjadi serangan cyber.

khairulhashfimuhammad