Want to create interactive content? It’s easy in Genially!

Get started free

McCumber cube presentation

Zeticus Oleg Juarez Malinko

Created on June 12, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Smart Quiz

Essential Quiz

Practical Quiz

Akihabara Quiz

Piñata Challenge

Math Calculations

Pixel Challenge

Transcript

Cybersecurity Cube Quiz & Presentation

By: Oleg

EMPEZAR

Infor. States

Desired goals

Safeguards

What is it?

John McCumber Created the cube in 1991 and it is to establish a evaluation of information security and it is in a rubiks cobe like model. The cybersecurity cube has 3 main sides

Desired goals: Confidenciality Integrity Availability Click to go to Page!
Information states: Storage Transmission Processing Click to go to page!
Safeguards: Policy & Practices Human factors Technology Click to go to page!

Infor. States

Desired goals

Safeguards

Back

Next

Infor. States

Desired goals

Safeguards

Desired Goals 1st Dimention

The First dimention commonly called CIA triad or Desired goals side and it is mostly targeted towards information, Confidenciality, Integrity, Availability, Providing protection to sensitive documents, to keep the integrity of the data,Availability: ensuring that information systems and services are accessible and operational when needed.Just some examples of what this side focuses on Some real world examples: Keeping sensitive data encrypted and safe, Keep your data and emails available for you at any time required, keeping the information in a non corrupted state.

Back

Next

Infor. States

Desired goals

Safeguards

Information States 2nd Dimention

Its main focus goes to three categories Storage: Data at Rest (DAR). Transmission: Data in Transit (DIT) & Processing its main goal is targeted to what hapens to data or informaton seither being stored, prossesed, or being sent out for storage in an information system, such as that stored in memory or on a magnetic tape or disk. Transmission is transferring data between information systems and Processing wich is performing operations on data in order to achieve a desired objective. Some examples: Transmission: Gmail sending your e-mail to the recipient, Having your google document stored in the cloud, Google processing your data to acomodate your prefferences better in the algorithm.

Back

Next

Infor. States

Desired goals

Safeguards

Safeguards 3rd Dimention

Safeguards refer to the measures put in place to protect and secure an organization's assets, systems, and data from cyber threats. This includes people-related safeguards such as employee training, access controls, and incident response, process-related safeguards like risk management, security policies, and change management, as well as technology-related safeguards such as firewalls, encryption, and endpoint protection.

Examples: Providing Employee training protocols & Code of conduct,Risk management, Security policies Firewalls and Intrusion, Encryption, Endpoint protection

Back

Next

Infor. States

Desired goals

Safeguards

The Next Step

You are now ready for the next step wich is the quizz this is the last page that is for you to go the last page!

If you do not understand something always feel free to click the home button to go to the start and reveiw again

Back

Next

Question 0/6

You have begun the quiz, Keep your correct and wrong answers counted if you got anything wrong concider reveiwing it later. Now if you are ready to proceed click the Next button if you wish to reveiw the information once more click the Home button in the top corner, Remember to try to do your quiz in atempts. Good luck! ︾︾︾︾

Next

Question 1/6

Next

Question 2/6

Next

Question 3/6

Next

Question 4/6

Next

Question 5/6

Next

Question 6/6

Next

The end

By: Oleg

Thank you for your attencion