SlideShare a Scribd company logo
1 of 12
‫الضوابط‬
‫األساسية‬
‫لالمن‬
‫السيبراني‬
🏴
☠️
•
‫الضوابط‬ ‫هذه‬ ‫تهدف‬
‫ٕلى‬‫ا‬
‫األدنـ‬ ‫الحد‬ ‫توفير‬
‫من‬ ‫ى‬
‫لألمن‬ ‫األساسية‬ ‫المتطلبات‬
‫السيبراني‬
‫الم‬
‫بنية‬
‫على‬
‫فضل‬ٔ‫ا‬
‫لتقليل‬ ‫والمعايير‬ ‫الممارسات‬
‫المخاطر‬
‫السيبرانية‬
‫المعلومات‬ ‫األصول‬ ‫على‬
‫ية‬
‫التهديدات‬ ‫من‬ ‫للجهات‬ ‫والتقنية‬
🔑
‫خذ‬ٔ‫ا‬‫وت‬
‫باالعتب‬ ‫الضوابط‬ ‫هذه‬
‫ار‬
‫المحاوراألساسية‬
‫يرتكز‬ ‫التي‬
‫األمن‬ ‫عليها‬
‫السيبراني‬
‫وهي‬ ‫؛‬
🚫
•
‫المعلومة‬ ‫سالمة‬
)
•
‫المعلومة‬ ‫توافر‬
)
‫األهداف‬
🔑
•
‫المعلومة‬ ‫سرية‬
)
‫األساسية‬ ‫األربعة‬ ‫المحاور‬
🧩
‫اإلستراتيجية‬
‫األشخاص‬
‫اإلجراء‬
‫التقنية‬
‫لأل‬ ‫األساسية‬ ‫الضوابط‬ ‫وهيكلية‬ ‫مكونات‬
‫من‬
‫السيبراني‬
🏴
☠️
•
‫حوكمة‬
‫االمن‬
‫السيبراني‬
🔓
•
‫االمن‬ ‫تعزيز‬
‫السيبراني‬
🔓
•
‫االمن‬ ‫صمود‬
‫السيبراني‬
🔓
•
‫االمن‬
‫السيبراني‬
‫المتعلق‬
🔓
•
‫االمن‬
‫السيبراني‬
‫النضمة‬
‫الصناعي‬ ‫التحكم‬
🔓
‫حوكمة‬
‫األمن‬
‫السيبراني‬
🏴
☠️
•
‫استراتجية‬
‫األمن‬
‫السيبراني‬
🚫
•
‫ضمان‬
‫سهام‬ٕ‫ا‬
‫لألمن‬ ‫العمل‬ ‫خطط‬
‫السيبراني‬
‫المتطل‬ ‫تحقيق‬ ‫في‬ ‫الجهة‬ ‫داخل‬ ‫واألهـداف‬
‫بات‬
‫التشريعية‬
•
‫األمن‬ ‫ادارة‬
‫السيبراني‬
🔑
•
‫يتعلق‬ ‫فيما‬ ‫للجهة‬ ‫الصالحية‬ ‫صاحب‬ ‫ودعم‬ ‫التزام‬ ‫ضمان‬
‫دارة‬ٕ‫ا‬‫ب‬
‫األ‬ ‫برامج‬ ‫وتطبيق‬
‫من‬
‫السيبراني‬
‫العالق‬ ‫ذات‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫للمتطلبات‬ ‫ا‬ً‫ق‬‫وف‬ ‫الجهة‬ ‫تلك‬ ‫في‬
‫ة‬
‫و‬ ‫سياسات‬
‫اجرا‬
’
‫ات‬
‫االمن‬
‫السيبراني‬
🧩
‫توثيق‬
‫ونشرمتطلبات‬
‫األمن‬
‫السيبراني‬
،‫بها‬ ‫الجهة‬ ‫والتزام‬
‫األمن‬ ‫إدارة‬
‫السيبراني‬
• ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫ٕستراتيجية‬‫ا‬
‫األمـن‬
‫السيبراني‬
‫ودعمها‬ ‫للجهة‬
• ‫يجب‬
‫ٕنشاء‬‫ا‬
‫ة‬ً‫ٕدار‬‫ا‬
‫باألمن‬ ‫معنية‬
‫السيبراني‬
‫في‬
‫عن‬ ‫مستقلة‬ ‫الجهة‬
‫ٕدارة‬‫ا‬
‫المعلومات‬ ‫تقنية‬
‫واالتصاالت‬
• ‫باألمن‬ ‫المعنية‬ ‫اإلدارة‬ ‫على‬ ‫يجب‬
‫السيبراني‬
‫سياسات‬ ‫تحديد‬ ‫الجهة‬ ‫في‬
‫ٕجــراءات‬‫ا‬‫و‬
‫األمن‬
‫السيبراني‬
‫وما‬
‫األمن‬ ‫تعزيز‬
‫السيبراني‬
🏴
☠️
•
‫األصول‬ ‫إدارة‬
🚫
•
‫كد‬ٔ‫ا‬‫للت‬
‫من‬
‫ن‬ٔ‫ا‬
‫لديها‬ ‫الجهة‬
‫مة‬ٔ‫ي‬‫قا‬
‫التفاصيل‬ ‫تشمل‬ ‫لألصول‬ ‫وحديثة‬ ‫دقيقة‬ ‫جرد‬
‫العالقة‬ ‫ذات‬
‫األصول‬ ‫لجميع‬
‫والصالحيات‬ ‫الدخول‬ ‫هويات‬ ‫إدارة‬
🔑
‫األمن‬ ‫حماية‬ ‫ضمان‬
‫السيبراني‬
‫المنطقي‬ ‫للوصول‬
(
Logical Access
)
‫ٕلى‬‫ا‬
‫المعلوماتية‬ ‫األصول‬
‫من‬ ‫للجهة‬ ‫والتقنية‬
‫جل‬ٔ‫ا‬
‫به‬ ‫المصرح‬ ‫غير‬ ‫الوصول‬ ‫منع‬
‫األجهزة‬ ‫حماية‬
‫واالنضمة‬
🧩
‫األنظمة‬ ‫حماية‬ ‫ضمان‬
‫جهزة‬ٔ‫ا‬‫و‬
‫ذلك‬ ‫في‬ ‫بما‬ ‫المعلومات‬ ‫معالجة‬
‫جهزة‬ٔ‫ا‬
‫التحتي‬ ‫والبنى‬ ‫المستخدمين‬
‫للجهة‬ ‫ة‬
‫الشبكات‬ ‫امن‬ ‫إدارة‬
•
‫األمن‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫السيبراني‬
‫والتقن‬ ‫المعلوماتية‬ ‫األصول‬ ‫إلدارة‬
‫ية‬
‫للجهة‬
.
•
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبراني‬
‫إلدا‬
‫رة‬
‫للجهة‬ ‫والتقنية‬ ‫المعلوماتية‬ ‫األصول‬
.
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبراني‬
‫إلدارة‬
‫هويات‬
‫الجهة‬ ‫في‬ ‫والصالحيات‬ ‫الدخول‬
.
‫ا‬
‫المحمولة‬ ‫األجهزة‬ ‫من‬
‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫األمن‬
‫السيبراني‬
‫الخاصة‬
‫من‬ٔ‫ا‬‫ب‬
‫األجهز‬
‫ة‬
‫الشخصية‬ ‫واألجهزة‬ ‫المحمولة‬
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبر‬
‫اني‬
‫الخاصة‬
‫من‬ٔ‫ا‬‫ب‬
‫المحمولة‬ ‫األجهزة‬
‫جهزة‬ٔ‫ا‬‫و‬
(
BYOD)
‫للجهة‬
.
‫األمن‬ ‫صمود‬
‫السيبراني‬
🏴
☠️
•
‫االمن‬ ‫صمود‬ ‫جوانب‬
‫السيبراني‬
‫االعمال‬ ‫إدارة‬ ‫في‬
🚫
•
‫األمن‬ ‫صمود‬ ‫متطلبات‬ ‫توافر‬ ‫ضمان‬
‫السيبراني‬
‫في‬
‫ٕدارة‬‫ا‬
‫استمرارية‬
‫عمال‬ٔ‫ا‬
‫الجهة‬
.
‫معالج‬ ‫وضمان‬
‫وتقليل‬ ‫ة‬
‫للجهة‬ ‫الحرجة‬ ‫اإللكترونية‬ ‫الخدمات‬ ‫في‬ ‫االضطرابات‬ ‫على‬ ‫المترتبة‬ ‫اآلثار‬
‫نظمة‬ٔ‫ا‬‫و‬
‫جهزة‬ٔ‫ا‬‫و‬
‫معال‬
‫جة‬
‫معلوماتها‬
‫االمن‬
‫السيبراني‬
‫المتعلق‬
‫باالطراف‬
‫والحوس‬ ‫الخارجية‬
‫بة‬
‫السحابية‬
🏴
☠️
•
‫االمن‬
‫السيبراني‬
‫المتعلق‬
‫باالطراف‬
‫الخارجية‬
🚫
•
‫حماية‬ ‫ضمان‬
‫صول‬ٔ‫ا‬
‫األمن‬ ‫مخاطر‬ ‫من‬ ‫الجهة‬
‫السيبراني‬
‫الخارجية‬ ‫باألطراف‬ ‫المتعلقة‬
(
‫بما‬
‫المدارة‬ ‫الخدمات‬ ‫و‬ ‫المعلومات‬ ‫لتقنية‬ ‫االسناد‬ ‫خدمات‬ ‫ذلك‬ ‫في‬
•
‫االمن‬
‫السيبراني‬
‫السحابية‬ ‫بالحوسبة‬ ‫المتعلق‬
🔑
•
‫المخاطر‬ ‫معالجة‬ ‫ضمان‬
‫السيبرانية‬
‫األمن‬ ‫متطلبات‬ ‫وتنفيذ‬
‫السيبراني‬
‫للحوسبة‬
‫السحابية‬
‫بشكل‬ ‫واالستضافة‬
‫م‬ٔ‫ي‬‫مال‬
‫التنظي‬ ‫واإلجــراءات‬ ‫للسياسات‬ ‫ا‬ً‫ق‬‫وف‬ ‫وذلك‬ ،‫عال‬ّ‫ف‬‫و‬
،‫للجهة‬ ‫مية‬
‫والتنظيمية‬ ‫التشريعية‬ ‫والمتطلبات‬
‫االمن‬
‫السيبراني‬
‫النتظمة‬
‫الصناعي‬ ‫التحكم‬
🏴
☠️
•
‫حماية‬
‫اجهازة‬
‫الصناعي‬ ‫التحكم‬ ‫وأنظمة‬
🚫
•
‫ضمان‬
‫ٕدارة‬‫ا‬
‫األمن‬
‫السيبراني‬
‫وسرية‬ ‫وسالمة‬ ‫توافر‬ ‫لحماية‬ ‫وفعال‬ ‫سليم‬ ‫بشكل‬
‫صول‬ٔ‫ا‬
‫ال‬ ‫الجهة‬
‫متعلقة‬
‫جهزة‬ٔ‫ا‬‫ب‬
‫نظمة‬ٔ‫ا‬‫و‬
‫الصناعي‬ ‫التحكم‬
(OT/ICS)
Presentation by
• ‫الشمري‬ ‫عبدالعزيز‬
• ‫فاضل‬ ‫عبدهللا‬
• ‫االمن‬
‫السيبراني‬
• ‫م‬
/
‫إبراهيم‬
‫العديني‬

More Related Content

What's hot

презентация1
презентация1презентация1
презентация1sagidullaa01
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectioninfoLock Technologies
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...FireEye, Inc.
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

What's hot (20)

презентация1
презентация1презентация1
презентация1
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 

Similar to Project cyper

Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
C I S C r i t i c a l C o n t r o l s
C I S  C r i t i c a l  C o n t r o l  sC I S  C r i t i c a l  C o n t r o l  s
C I S C r i t i c a l C o n t r o l sssuserd4ef17
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdfDorcusSitali
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedownZaynah Zameer
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedownHasna Zameer
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...EC-Council
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh KumarNeed for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 

Similar to Project cyper (20)

Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
C I S C r i t i c a l C o n t r o l s
C I S  C r i t i c a l  C o n t r o l  sC I S  C r i t i c a l  C o n t r o l  s
C I S C r i t i c a l C o n t r o l s
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Ccie security 01
Ccie security 01Ccie security 01
Ccie security 01
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh KumarNeed for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 

Recently uploaded

Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...shivangimorya083
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
Full night 🥵 Call Girls Delhi New Friends Colony {9711199171} Sanya Reddy ✌️o...
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 

Project cyper

  • 1. ‫الضوابط‬ ‫األساسية‬ ‫لالمن‬ ‫السيبراني‬ 🏴 ☠️ • ‫الضوابط‬ ‫هذه‬ ‫تهدف‬ ‫ٕلى‬‫ا‬ ‫األدنـ‬ ‫الحد‬ ‫توفير‬ ‫من‬ ‫ى‬ ‫لألمن‬ ‫األساسية‬ ‫المتطلبات‬ ‫السيبراني‬ ‫الم‬ ‫بنية‬ ‫على‬ ‫فضل‬ٔ‫ا‬ ‫لتقليل‬ ‫والمعايير‬ ‫الممارسات‬ ‫المخاطر‬ ‫السيبرانية‬ ‫المعلومات‬ ‫األصول‬ ‫على‬ ‫ية‬ ‫التهديدات‬ ‫من‬ ‫للجهات‬ ‫والتقنية‬ 🔑
  • 2. ‫خذ‬ٔ‫ا‬‫وت‬ ‫باالعتب‬ ‫الضوابط‬ ‫هذه‬ ‫ار‬ ‫المحاوراألساسية‬ ‫يرتكز‬ ‫التي‬ ‫األمن‬ ‫عليها‬ ‫السيبراني‬ ‫وهي‬ ‫؛‬ 🚫 • ‫المعلومة‬ ‫سالمة‬ ) • ‫المعلومة‬ ‫توافر‬ ) ‫األهداف‬ 🔑 • ‫المعلومة‬ ‫سرية‬ ) ‫األساسية‬ ‫األربعة‬ ‫المحاور‬ 🧩 ‫اإلستراتيجية‬ ‫األشخاص‬ ‫اإلجراء‬ ‫التقنية‬
  • 3. ‫لأل‬ ‫األساسية‬ ‫الضوابط‬ ‫وهيكلية‬ ‫مكونات‬ ‫من‬ ‫السيبراني‬ 🏴 ☠️ • ‫حوكمة‬ ‫االمن‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫تعزيز‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫صمود‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ 🔓 • ‫االمن‬ ‫السيبراني‬ ‫النضمة‬ ‫الصناعي‬ ‫التحكم‬ 🔓
  • 4. ‫حوكمة‬ ‫األمن‬ ‫السيبراني‬ 🏴 ☠️ • ‫استراتجية‬ ‫األمن‬ ‫السيبراني‬ 🚫 • ‫ضمان‬ ‫سهام‬ٕ‫ا‬ ‫لألمن‬ ‫العمل‬ ‫خطط‬ ‫السيبراني‬ ‫المتطل‬ ‫تحقيق‬ ‫في‬ ‫الجهة‬ ‫داخل‬ ‫واألهـداف‬ ‫بات‬ ‫التشريعية‬ • ‫األمن‬ ‫ادارة‬ ‫السيبراني‬ 🔑 • ‫يتعلق‬ ‫فيما‬ ‫للجهة‬ ‫الصالحية‬ ‫صاحب‬ ‫ودعم‬ ‫التزام‬ ‫ضمان‬ ‫دارة‬ٕ‫ا‬‫ب‬ ‫األ‬ ‫برامج‬ ‫وتطبيق‬ ‫من‬ ‫السيبراني‬ ‫العالق‬ ‫ذات‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫للمتطلبات‬ ‫ا‬ً‫ق‬‫وف‬ ‫الجهة‬ ‫تلك‬ ‫في‬ ‫ة‬ ‫و‬ ‫سياسات‬ ‫اجرا‬ ’ ‫ات‬ ‫االمن‬ ‫السيبراني‬ 🧩 ‫توثيق‬ ‫ونشرمتطلبات‬ ‫األمن‬ ‫السيبراني‬ ،‫بها‬ ‫الجهة‬ ‫والتزام‬
  • 5. ‫األمن‬ ‫إدارة‬ ‫السيبراني‬ • ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫ٕستراتيجية‬‫ا‬ ‫األمـن‬ ‫السيبراني‬ ‫ودعمها‬ ‫للجهة‬ • ‫يجب‬ ‫ٕنشاء‬‫ا‬ ‫ة‬ً‫ٕدار‬‫ا‬ ‫باألمن‬ ‫معنية‬ ‫السيبراني‬ ‫في‬ ‫عن‬ ‫مستقلة‬ ‫الجهة‬ ‫ٕدارة‬‫ا‬ ‫المعلومات‬ ‫تقنية‬ ‫واالتصاالت‬ • ‫باألمن‬ ‫المعنية‬ ‫اإلدارة‬ ‫على‬ ‫يجب‬ ‫السيبراني‬ ‫سياسات‬ ‫تحديد‬ ‫الجهة‬ ‫في‬ ‫ٕجــراءات‬‫ا‬‫و‬ ‫األمن‬ ‫السيبراني‬ ‫وما‬
  • 6. ‫األمن‬ ‫تعزيز‬ ‫السيبراني‬ 🏴 ☠️ • ‫األصول‬ ‫إدارة‬ 🚫 • ‫كد‬ٔ‫ا‬‫للت‬ ‫من‬ ‫ن‬ٔ‫ا‬ ‫لديها‬ ‫الجهة‬ ‫مة‬ٔ‫ي‬‫قا‬ ‫التفاصيل‬ ‫تشمل‬ ‫لألصول‬ ‫وحديثة‬ ‫دقيقة‬ ‫جرد‬ ‫العالقة‬ ‫ذات‬ ‫األصول‬ ‫لجميع‬ ‫والصالحيات‬ ‫الدخول‬ ‫هويات‬ ‫إدارة‬ 🔑 ‫األمن‬ ‫حماية‬ ‫ضمان‬ ‫السيبراني‬ ‫المنطقي‬ ‫للوصول‬ ( Logical Access ) ‫ٕلى‬‫ا‬ ‫المعلوماتية‬ ‫األصول‬ ‫من‬ ‫للجهة‬ ‫والتقنية‬ ‫جل‬ٔ‫ا‬ ‫به‬ ‫المصرح‬ ‫غير‬ ‫الوصول‬ ‫منع‬ ‫األجهزة‬ ‫حماية‬ ‫واالنضمة‬ 🧩 ‫األنظمة‬ ‫حماية‬ ‫ضمان‬ ‫جهزة‬ٔ‫ا‬‫و‬ ‫ذلك‬ ‫في‬ ‫بما‬ ‫المعلومات‬ ‫معالجة‬ ‫جهزة‬ٔ‫ا‬ ‫التحتي‬ ‫والبنى‬ ‫المستخدمين‬ ‫للجهة‬ ‫ة‬
  • 7. ‫الشبكات‬ ‫امن‬ ‫إدارة‬ • ‫األمن‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫السيبراني‬ ‫والتقن‬ ‫المعلوماتية‬ ‫األصول‬ ‫إلدارة‬ ‫ية‬ ‫للجهة‬ . • ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبراني‬ ‫إلدا‬ ‫رة‬ ‫للجهة‬ ‫والتقنية‬ ‫المعلوماتية‬ ‫األصول‬ . ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبراني‬ ‫إلدارة‬ ‫هويات‬ ‫الجهة‬ ‫في‬ ‫والصالحيات‬ ‫الدخول‬ .
  • 8. ‫ا‬ ‫المحمولة‬ ‫األجهزة‬ ‫من‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫األمن‬ ‫السيبراني‬ ‫الخاصة‬ ‫من‬ٔ‫ا‬‫ب‬ ‫األجهز‬ ‫ة‬ ‫الشخصية‬ ‫واألجهزة‬ ‫المحمولة‬ ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبر‬ ‫اني‬ ‫الخاصة‬ ‫من‬ٔ‫ا‬‫ب‬ ‫المحمولة‬ ‫األجهزة‬ ‫جهزة‬ٔ‫ا‬‫و‬ ( BYOD) ‫للجهة‬ .
  • 9. ‫األمن‬ ‫صمود‬ ‫السيبراني‬ 🏴 ☠️ • ‫االمن‬ ‫صمود‬ ‫جوانب‬ ‫السيبراني‬ ‫االعمال‬ ‫إدارة‬ ‫في‬ 🚫 • ‫األمن‬ ‫صمود‬ ‫متطلبات‬ ‫توافر‬ ‫ضمان‬ ‫السيبراني‬ ‫في‬ ‫ٕدارة‬‫ا‬ ‫استمرارية‬ ‫عمال‬ٔ‫ا‬ ‫الجهة‬ . ‫معالج‬ ‫وضمان‬ ‫وتقليل‬ ‫ة‬ ‫للجهة‬ ‫الحرجة‬ ‫اإللكترونية‬ ‫الخدمات‬ ‫في‬ ‫االضطرابات‬ ‫على‬ ‫المترتبة‬ ‫اآلثار‬ ‫نظمة‬ٔ‫ا‬‫و‬ ‫جهزة‬ٔ‫ا‬‫و‬ ‫معال‬ ‫جة‬ ‫معلوماتها‬
  • 10. ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ ‫باالطراف‬ ‫والحوس‬ ‫الخارجية‬ ‫بة‬ ‫السحابية‬ 🏴 ☠️ • ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ ‫باالطراف‬ ‫الخارجية‬ 🚫 • ‫حماية‬ ‫ضمان‬ ‫صول‬ٔ‫ا‬ ‫األمن‬ ‫مخاطر‬ ‫من‬ ‫الجهة‬ ‫السيبراني‬ ‫الخارجية‬ ‫باألطراف‬ ‫المتعلقة‬ ( ‫بما‬ ‫المدارة‬ ‫الخدمات‬ ‫و‬ ‫المعلومات‬ ‫لتقنية‬ ‫االسناد‬ ‫خدمات‬ ‫ذلك‬ ‫في‬ • ‫االمن‬ ‫السيبراني‬ ‫السحابية‬ ‫بالحوسبة‬ ‫المتعلق‬ 🔑 • ‫المخاطر‬ ‫معالجة‬ ‫ضمان‬ ‫السيبرانية‬ ‫األمن‬ ‫متطلبات‬ ‫وتنفيذ‬ ‫السيبراني‬ ‫للحوسبة‬ ‫السحابية‬ ‫بشكل‬ ‫واالستضافة‬ ‫م‬ٔ‫ي‬‫مال‬ ‫التنظي‬ ‫واإلجــراءات‬ ‫للسياسات‬ ‫ا‬ً‫ق‬‫وف‬ ‫وذلك‬ ،‫عال‬ّ‫ف‬‫و‬ ،‫للجهة‬ ‫مية‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫والمتطلبات‬
  • 11. ‫االمن‬ ‫السيبراني‬ ‫النتظمة‬ ‫الصناعي‬ ‫التحكم‬ 🏴 ☠️ • ‫حماية‬ ‫اجهازة‬ ‫الصناعي‬ ‫التحكم‬ ‫وأنظمة‬ 🚫 • ‫ضمان‬ ‫ٕدارة‬‫ا‬ ‫األمن‬ ‫السيبراني‬ ‫وسرية‬ ‫وسالمة‬ ‫توافر‬ ‫لحماية‬ ‫وفعال‬ ‫سليم‬ ‫بشكل‬ ‫صول‬ٔ‫ا‬ ‫ال‬ ‫الجهة‬ ‫متعلقة‬ ‫جهزة‬ٔ‫ا‬‫ب‬ ‫نظمة‬ٔ‫ا‬‫و‬ ‫الصناعي‬ ‫التحكم‬ (OT/ICS)
  • 12. Presentation by • ‫الشمري‬ ‫عبدالعزيز‬ • ‫فاضل‬ ‫عبدهللا‬ • ‫االمن‬ ‫السيبراني‬ • ‫م‬ / ‫إبراهيم‬ ‫العديني‬