Training Course

Cyber Security and Strategy

Cyber Security and Strategy

With the technology advancement and the data connectivity across the globe, cyber landscape is facing increasing challenges of cyber threats related to Malware, Dark Web, Network Security, Cloud Computing, Artificial Intelligence, Internet of Things, and Fi- nancial Frauds etc. Cyber security risk is increasing, driven by global connectivity and usage of cloud services, to store sensitive data and personal information. Widespread poor configuration of cloud services paired with increasingly sophisticated cyber criminals means the risk that your organization suffers from a successful cyber attack or data breach is on the rise.

Today, cyberspace is rapidly evolving, and it can even be used as a new battleground for conflicts between States. Cyber space offers innovative challenges to States for many reasons:

  1. it falls under few international regulations,
  2. it tends to ignore state borders,
  3. it does not always differentiate between the public and the private spheres.





Cyber security is important because it encompasses everything that pertains to protecting our sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries.

Cyber security is the collection of tools, policies, security concepts, security safe- guards, guidelines, risk management approaches, actions, best practices, assurance and technologies that can be used to protect the cyber environment, an organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment.
Cyber security strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment.

The general security objectives comprise the following:

  1. Availability
  2. Integrity, which may include authenticity and non-repudiation
  3. Confidentiality




Resource Material 

Other Courses