Week 13 - Cybersecurity Policy

aka — okay, it's bad..
..what to DO about it.
Glad you asked..

BROADLY

For better or worse...
..catastrophic failure is not seen as bad as "failure to prepare"

So then, despite reality:

If you can reasonably show that you've done
industry standards, you're probably good to go.

Industry standards?

Okay, what are they?

Good question.
They change all the time. Will discuss broad concepts below.
Mix with names like Norton and McAfee


Policy in General

(Both of these are extremely difficult, maybe literally the hardest part)

Encryption / Privacy

Infrastructure Protection

but also understand that they may not be very good

Software Updates


User Access and Security Measures

..which frankly, I'm not sure are particularly useful?

Email

(again, this is much easier with official work emails)


Website Security

SSL / or provider
(This is generally not TOO hard unless you do websites yourself;
you can generally outsource and rely on "state of the art")

Network

Firewalls
Password protection
Network Segmentation - Airgaps?
Remote use policy
BYOD Policy?

ONCE AGAIN--


My personal IT rule, as I have discovered:

Prepare to be shocked. This stuff is ALL OVER THE PLACE.

But what if it literally is YOUR STUFF?


FAIL ELEGANTLY.

Disaster Recovery - REDUNDANCY

Disaster Recovery - REDUNDANCY

Consider SYNC and BACKUP (which are not always exactly the same)
(Perhaps you've heard RAID IS NOT BACKUP?)

SYNC

BUT ALSO, BACKUP, not SYNC

ALSO

...but merely periodically. Keep multiple timelines and timeframes (daily, weekly, monthly, yearly, etc)

REDUNDANCY in systems

Try not to be a monoculture anything?
Mix old and new operating systems
(even if you have to keep the old ones ..

OFFLINE

I'm genuinely not sure why "offline strategy" appears to not be strongly pushed..
...well, actually I am. How else will you sell "the cloud" to people who don't need it?

The Cloud

Again, same story: Redundancy, and mostly



Backlinks: FSU Courses:LIS4774:RawSlides