Submit Search
Upload
Project cyper
•
Download as PPTX, PDF
•
0 likes
•
199 views
A
AbdulazizShammri
Follow
اساسيات الامن السيبراني
Read less
Read more
Software
Report
Share
Report
Share
1 of 9
Download now
Recommended
مشروع الامن السيبراني
مشروع الامن السيبراني
meshalalmrwani
Project cyper
Project cyper
AbdulazizShammri
Introduction to Network Security
Introduction to Network Security
John Ely Masculino
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
Network security
Network security
Pooja Dewangan
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
Gabriel E Ozique
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
Recommended
مشروع الامن السيبراني
مشروع الامن السيبراني
meshalalmrwani
Project cyper
Project cyper
AbdulazizShammri
Introduction to Network Security
Introduction to Network Security
John Ely Masculino
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
Network security
Network security
Pooja Dewangan
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
Gabriel E Ozique
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
Information security ist lecture
Information security ist lecture
Zara Nawaz
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
Twinkle Sebastian
It and-cyber-module-2
It and-cyber-module-2
Marneil Sanchez
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
Fidelis Cybersecurity
Cybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
Khas bank isms 3 s
Khas bank isms 3 s
Khaltar Togtuun
Security Awareness and Training
Security Awareness and Training
Priyank Hada
12 security policies
12 security policies
Saqib Raza
Introduction to information security
Introduction to information security
Kumawat Dharmpal
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
Cyber security issues
Cyber security issues
Nadhirah Kadir
Maritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis
Your cyber security webinar
Your cyber security webinar
Empired
Network Security
Network Security
Techknow Book
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Fidelis Cybersecurity
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
CloudIDSummit
Cyber Security
Cyber Security
ADGP, Public Grivences, Bangalore
The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
Ch01 Introduction to Security
Ch01 Introduction to Security
Information Technology
Information Systems Policy
Information Systems Policy
Ali Sadhik Shaik
C I S C r i t i c a l C o n t r o l s
C I S C r i t i c a l C o n t r o l s
ssuserd4ef17
More Related Content
What's hot
Information security ist lecture
Information security ist lecture
Zara Nawaz
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
Twinkle Sebastian
It and-cyber-module-2
It and-cyber-module-2
Marneil Sanchez
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
Fidelis Cybersecurity
Cybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
Khas bank isms 3 s
Khas bank isms 3 s
Khaltar Togtuun
Security Awareness and Training
Security Awareness and Training
Priyank Hada
12 security policies
12 security policies
Saqib Raza
Introduction to information security
Introduction to information security
Kumawat Dharmpal
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
Cyber security issues
Cyber security issues
Nadhirah Kadir
Maritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis
Your cyber security webinar
Your cyber security webinar
Empired
Network Security
Network Security
Techknow Book
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Fidelis Cybersecurity
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
CloudIDSummit
Cyber Security
Cyber Security
ADGP, Public Grivences, Bangalore
The State of Threat Detection 2019
The State of Threat Detection 2019
Fidelis Cybersecurity
Ch01 Introduction to Security
Ch01 Introduction to Security
Information Technology
What's hot
(20)
Information security ist lecture
Information security ist lecture
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
It and-cyber-module-2
It and-cyber-module-2
Game Changing Cyber Defensive Strategies for 2019
Game Changing Cyber Defensive Strategies for 2019
Cybersecurity Hands-On Training
Cybersecurity Hands-On Training
Khas bank isms 3 s
Khas bank isms 3 s
Security Awareness and Training
Security Awareness and Training
12 security policies
12 security policies
Introduction to information security
Introduction to information security
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
Cyber security issues
Cyber security issues
Maritime Cyber Security
Maritime Cyber Security
Your cyber security webinar
Your cyber security webinar
Network Security
Network Security
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
Cyber Security
Cyber Security
The State of Threat Detection 2019
The State of Threat Detection 2019
Ch01 Introduction to Security
Ch01 Introduction to Security
Similar to Project cyper
Information Systems Policy
Information Systems Policy
Ali Sadhik Shaik
C I S C r i t i c a l C o n t r o l s
C I S C r i t i c a l C o n t r o l s
ssuserd4ef17
Presentation 1.pptx
Presentation 1.pptx
rabeetkashif
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
Symantec
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
AT-NET Services, Inc. - Charleston Division
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
Zaynah Zameer
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
Hasna Zameer
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
ssuserf98dd4
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
DorcusSitali
Starting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
Cade Zvavanjanja
Information Security It's All About Compliance
Information Security It's All About Compliance
Dinesh O Bareja
Information Security
Information Security
Alok Katiyar
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
Information Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
Information Security for Small Business
Information Security for Small Business
Julius Clark, CISSP, CISA
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Rimurutempest594985
Cyber security
Cyber security
TanmoyMaitra
Ccie security 01
Ccie security 01
Peter Cheong
Similar to Project cyper
(20)
Information Systems Policy
Information Systems Policy
C I S C r i t i c a l C o n t r o l s
C I S C r i t i c a l C o n t r o l s
Presentation 1.pptx
Presentation 1.pptx
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
Starting your Career in Information Security
Starting your Career in Information Security
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
Information Security It's All About Compliance
Information Security It's All About Compliance
Information Security
Information Security
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Information Security for Small Business
Information Security for Small Business
Information Security for Small Business
Information Security for Small Business
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
Cyber security
Cyber security
Ccie security 01
Ccie security 01
Recently uploaded
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio, Inc.
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
BradBedford3
DNT_Corporate presentation know about us
DNT_Corporate presentation know about us
Dynamic Netsoft
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
AxelRicardoTrocheRiq
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ICS
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
Neo4j
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
gurkirankumar98700
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
Wave PLM
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
Power Karaoke
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
kotipi9215
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
Christina Lin
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
bodapatigopi8531
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
OnePlan Solutions
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
shikhaohhpro
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
kalichargn70th171
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
soniya singh
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
Mehedi Hasan Shohan
Professional Resume Template for Software Developers
Professional Resume Template for Software Developers
Vinodh Ram
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
Frank van der Linden
Recently uploaded
(20)
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
DNT_Corporate presentation know about us
DNT_Corporate presentation know about us
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
EY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽❤️🧑🏻 89...
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
Professional Resume Template for Software Developers
Professional Resume Template for Software Developers
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
Project cyper
1.
األساسية الضوابط لالمن السيبراني 🏴 ☠️ الضوابط هذه
تهدف ٕلىا لأل األساسية المتطلبات من األدنـى الحد توفير من السيبراني على المبنية فضلٔا المخاط لتقليل والمعايير الممارسات ر السيبرانية التهديدات من للجهات والتقنية المعلوماتية األصول على 🚫
2.
خذٔاوت باالعتبار الضوابط هذه المحاوراألساسية ير
التي عليها تكز األمن السيبراني وهي ؛ 🚫 • المعلومة سالمة ) • المعلومة توافر ) األهداف 🔑 • المعلومة سرية ) األساسية األربعة المحاور 🧩 اإلستراتيجية األشخاص اإلجراء التقنية
3.
لألمن األساسية الضوابط
وهيكلية مكونات السيبران ي 🏴 ☠️ • حوكمة االمن السيبراني 🔓 • االمن تعزيز السيبراني 🔓 • االمن صمود السيبراني 🔓 • االمن السيبراني المتعلق 🔓 • االمن السيبراني النضمة الصناعي التحكم 🔓
4.
حوكمة األمن السيبراني 🏴 ☠️ • استراتجية األمن السيبراني 🚫 • ضمان ٕسهاما لألمن العمل خطط السيبراني التشري
المتطلبات تحقيق في الجهة داخل واألهـداف عية • األمن ادارة السيبراني 🔑 • يتعلق فيما للجهة الصالحية صاحب ودعم التزام ضمان ٕدارةاب األمن برامج وتطبيق السيبرا ني تلك في العالقة ذات والتنظيمية التشريعية للمتطلبات اًقوف الجهة و سياسات اجرا ’ ات االمن السيبراني 🧩 توثيق ونشرمتطلبات األمن السيبراني ،بها الجهة والتزام
5.
األمن تعزيز السيبراني 🏴 ☠️ • األصول إدارة 🚫 • كدٔاللت من نٔا لديها
الجهة مةٔيقا التفاصيل تشمل لألصول وحديثة دقيقة جرد العالقة ذات األصول لجميع والصالحيات الدخول هويات إدارة 🔑 األمن حماية ضمان السيبراني المنطقي للوصول ( Logical Access ) ٕلىا المعلوماتية األصول من للجهة والتقنية جلٔا به المصرح غير الوصول منع األجهزة حماية واالنضمة 🧩 األنظمة حماية ضمان جهزةٔاو ذلك في بما المعلومات معالجة جهزةٔا التحتي والبنى المستخدمين للجهة ة
6.
األمن صمود السيبراني 🏴 ☠️ • االمن صمود
جوانب السيبراني االعمال إدارة في 🚫 • األمن صمود متطلبات توافر ضمان السيبراني في ٕدارةا استمرارية عمالٔا الجهة . معالج وضمان وتقليل ة للجهة الحرجة اإللكترونية الخدمات في االضطرابات على المترتبة اآلثار نظمةٔاو جهزةٔاو معال جة معلوماتها
7.
االمن السيبراني المتعلق باالطراف والحوس الخارجية بة السحابية 🏴 ☠️ • االمن السيبراني المتعلق باالطراف الخارجية 🚫 • حماية ضمان صولٔا األمن
مخاطر من الجهة السيبراني الخارجية باألطراف المتعلقة ( بما المدارة الخدمات و المعلومات لتقنية االسناد خدمات ذلك في • االمن السيبراني السحابية بالحوسبة المتعلق 🔑 • المخاطر معالجة ضمان السيبرانية األمن متطلبات وتنفيذ السيبراني للحوسبة السحابية بشكل واالستضافة مٔيمال التنظي واإلجــراءات للسياسات اًقوف وذلك ،عالّفو ،للجهة مية والتنظيمية التشريعية والمتطلبات
8.
االمن السيبراني النتظمة الصناعي التحكم 🏴 ☠️ • حماية اجهازة الصناعي التحكم
وأنظمة 🚫 • ضمان ٕدارةا األمن السيبراني وسرية وسالمة توافر لحماية وفعال سليم بشكل صولٔا ال الجهة متعلقة جهزةٔاب نظمةٔاو الصناعي التحكم (OT/ICS)
9.
Presentation by • Abdulaziz
alshammri • Abdulah fadel CTE Students
Download now