Difference between revisions of "What the Security Is"

From CNM Wiki
Jump to: navigation, search
(Created page with "400px|thumb|right|[[CNM Cyber]]Cyber Workforce Clearances (hereinafter, the ''Lectio'') is the lesson part of the '''CNM Cabin Essent...")
 
 
(34 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[File:Cnm-digital.png|400px|thumb|right|[[CNM Cyber]]]][[Cyber Workforce Clearances]] (hereinafter, the ''Lectio'') is the [[lectio|lesson part]] of the '''[[CNM Cabin Essentials]]''' [[lesson]] that introduces its participants to [[CNM Cabin]]. This ''lesson'' belongs to the [[CNM Cyber for Experience]] session of the [[CNM Cyber Orientation]].
+
[[File:Cnm-digital.png|400px|thumb|right|[[CNMCyber suite]]s]][[What the Security Is]] (hereinafter, the ''Lectio'') is the [[lectio|lesson part]] of the '''[[Cyber Security Essentials]]''' [[lesson]] that introduces its participants to [[CNM Cabin]]. This ''lesson'' belongs to the [[Introduction to CNMCyber]] session of [[WorldOpp Orientation]].
  
  
 
==Content==
 
==Content==
The predecessor [[lectio]] is [[Sensitive Data Management]].
+
The predecessor [[lectio]] is [[What Pipeline Is]].
  
===Key terms===
+
===Script===
:'''[[User data]]'''. Any data that the [[end-user]] of a particular [[system]] creates or owns.<div style="background-color:#efefef; padding: 5px; margin: 15px;">
+
:[[CNMCyber Team]] strives to protect both the systems and data of [[CNMCyber]]. The ''Team'' distinguishes two branches of the security governance.
:*'''[[Username]]''' ([[login name]], [[account name]], [[handle]], or, rarely, [[ID]]). The humanly-readable name of [[user account]] that the [[end-user]] utilizes to access that ''account''. A ''username'' is an essential part of [[user data]].
+
 
:*'''[[Password]]''' ([[passcode]]). Any string of characters that is used to confirm user's identity. The [[NIST Digital Identity Guidelines]] defines a ''password'' as "the secret is memorized by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.</div>
+
:The policy branch can be compared with the legislative branch of the government. This branch defines policies that serve as the law of the ''CNMCyber'' land.
 +
 
 +
:For instance, the [[privacy policy]] defines how sensitive [[user data]] can be collected and shared. The [[backup and recovery policy]] determines how the systems and data shall be protected from disaster losses. [[User access policy]] sets up what users can access what resources. [[Informational resource policy]] outlines the database management rules. Finally, [[human resource policy]] regulates the clearances and other practices towards the personnel that need to access the sensitive data because of their professional duties.
 +
 
 +
:The executive branch executes the policies and, especially, [[cyber-security]], which is protecting computers, data, and networks from potential attacks or unauthorized access.
  
===Script===
+
:To protect web operations of [[CNMCyber]], all of its [[website]] are secured with [[SSL certificate]]s. So, when you communicate with the ''Cyber'' over the [[Internet]], all of the communications are encrypted and practically impossible to hack.
:[[User data]] is any [[data]] that an [[end-user]] of a particular system, including [[CNM Cabin]], creates or owns. This data may have several levels.
 
  
:For instance, you have created your [[username]] at [[CNM Cabin]], but don't own that. This is a feature of this ''system''; this feature can be changed only if the system's code is re-written or system's settings are changed. You can possibly open a new [[user account]] and pick up a new ''username'', but your current ''account'' will keep the same name for its life being.
+
:[[CNMCyber Team]] is constantly applying new security patches and is following security recommendations to protect its [[software system]]s from [[end-user application]]s and up to [[computing server]]s of the ''Cyber''. Specific information related to a particular system can be found in its [[product epic]] at [[CNM Wiki]].  
  
:At the same time, you have created your password and own that -- you can change it at any time through [[CNM Cabin]]. Similarly, you can manage your profile and preferences there.
+
:The access to the highest risk areas such as administrative projects of [[CNM Lab]] is protected by the [[public key infrastructure]] ([[public key infrastructure|PKI]]). This technology is the most secure from all that are available on the market.
  
:The overwhelming majority of ''your data'' such as your exam scores or [[wikipage]] edits are collected automatically, through the algorithms that systems administrators manage. While using [[CNM Cyber]], you create that ''data'', but may or may not be able to change it. By default, the data is [[timestamp]]ed is harder or impossible to change. However, a new action like a new ''wikipage'' edit can undo or reverse the previous action.
+
===Key terms===
 +
:[[Cyber-security]], [[encryption]], [[SSL certificate]]
  
:On the other end, the system administrators can alternate your access permissions at any time. They may also change some, but not all of that ''data''. For instance, the course teacher may override some of your exam scores. At [[CNM Cyber]], [[product epic]]s define who can manage the ''user data'', what data can be managed, how it can be managed, and how it shall be secured.
+
===Closing===
 +
:Would you be interested in working on [[cyber-security]] of [[CNMCyber]]? --Yes/No/I'm not sure
  
'''[[CNM Cloud Essentials]]''' is the successor [[lectio]].
+
'''[[User Data in Cyber]]''' is the successor [[lectio]].
  
 
==Questions==
 
==Questions==
 
===Lectio quiz===
 
:The answer is recorded for the lectio completion purpose:
 
:*Which statement below is correct:<ol type="a"><li>You can change your [[username]] at [[CNM Cyber]] at any time.</li><li>You can pick a new [[username]] at [[CNM Cyber]] when you create a new [[user account]].</li><li>You cannot change your [[password]] at [[CNM Cyber]].</li><li>All of the other substantive answers are correct</li><li>None of the other answers is correct</li></ol>
 
  
 
===Placement entrance exam===
 
===Placement entrance exam===

Latest revision as of 21:25, 29 October 2023

What the Security Is (hereinafter, the Lectio) is the lesson part of the Cyber Security Essentials lesson that introduces its participants to CNM Cabin. This lesson belongs to the Introduction to CNMCyber session of WorldOpp Orientation.


Content

The predecessor lectio is What Pipeline Is.

Script

CNMCyber Team strives to protect both the systems and data of CNMCyber. The Team distinguishes two branches of the security governance.
The policy branch can be compared with the legislative branch of the government. This branch defines policies that serve as the law of the CNMCyber land.
For instance, the privacy policy defines how sensitive user data can be collected and shared. The backup and recovery policy determines how the systems and data shall be protected from disaster losses. User access policy sets up what users can access what resources. Informational resource policy outlines the database management rules. Finally, human resource policy regulates the clearances and other practices towards the personnel that need to access the sensitive data because of their professional duties.
The executive branch executes the policies and, especially, cyber-security, which is protecting computers, data, and networks from potential attacks or unauthorized access.
To protect web operations of CNMCyber, all of its website are secured with SSL certificates. So, when you communicate with the Cyber over the Internet, all of the communications are encrypted and practically impossible to hack.
CNMCyber Team is constantly applying new security patches and is following security recommendations to protect its software systems from end-user applications and up to computing servers of the Cyber. Specific information related to a particular system can be found in its product epic at CNM Wiki.
The access to the highest risk areas such as administrative projects of CNM Lab is protected by the public key infrastructure (PKI). This technology is the most secure from all that are available on the market.

Key terms

Cyber-security, encryption, SSL certificate

Closing

Would you be interested in working on cyber-security of CNMCyber? --Yes/No/I'm not sure

User Data in Cyber is the successor lectio.

Questions

Placement entrance exam