Want to create interactive content? It’s easy in Genially!
McCumber cube presentation
Zeticus Oleg Juarez Malinko
Created on June 12, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Smart Quiz
View
Essential Quiz
View
Practical Quiz
View
Akihabara Quiz
View
Piñata Challenge
View
Math Calculations
View
Pixel Challenge
Transcript
Cybersecurity Cube Quiz & Presentation
By: Oleg
EMPEZAR
Infor. States
Desired goals
Safeguards
What is it?
John McCumber Created the cube in 1991 and it is to establish a evaluation of information security and it is in a rubiks cobe like model. The cybersecurity cube has 3 main sides
Desired goals: Confidenciality Integrity Availability Click to go to Page!
Information states: Storage Transmission Processing Click to go to page!
Safeguards: Policy & Practices Human factors Technology Click to go to page!
Infor. States
Desired goals
Safeguards
Back
Next
Infor. States
Desired goals
Safeguards
Desired Goals 1st Dimention
The First dimention commonly called CIA triad or Desired goals side and it is mostly targeted towards information, Confidenciality, Integrity, Availability, Providing protection to sensitive documents, to keep the integrity of the data,Availability: ensuring that information systems and services are accessible and operational when needed.Just some examples of what this side focuses on Some real world examples: Keeping sensitive data encrypted and safe, Keep your data and emails available for you at any time required, keeping the information in a non corrupted state.
Back
Next
Infor. States
Desired goals
Safeguards
Information States 2nd Dimention
Its main focus goes to three categories Storage: Data at Rest (DAR). Transmission: Data in Transit (DIT) & Processing its main goal is targeted to what hapens to data or informaton seither being stored, prossesed, or being sent out for storage in an information system, such as that stored in memory or on a magnetic tape or disk. Transmission is transferring data between information systems and Processing wich is performing operations on data in order to achieve a desired objective. Some examples: Transmission: Gmail sending your e-mail to the recipient, Having your google document stored in the cloud, Google processing your data to acomodate your prefferences better in the algorithm.
Back
Next
Infor. States
Desired goals
Safeguards
Safeguards 3rd Dimention
Safeguards refer to the measures put in place to protect and secure an organization's assets, systems, and data from cyber threats. This includes people-related safeguards such as employee training, access controls, and incident response, process-related safeguards like risk management, security policies, and change management, as well as technology-related safeguards such as firewalls, encryption, and endpoint protection.
Examples: Providing Employee training protocols & Code of conduct,Risk management, Security policies Firewalls and Intrusion, Encryption, Endpoint protection
Back
Next
Infor. States
Desired goals
Safeguards
The Next Step
You are now ready for the next step wich is the quizz this is the last page that is for you to go the last page!
If you do not understand something always feel free to click the home button to go to the start and reveiw again
Back
Next
Question 0/6
You have begun the quiz, Keep your correct and wrong answers counted if you got anything wrong concider reveiwing it later. Now if you are ready to proceed click the Next button if you wish to reveiw the information once more click the Home button in the top corner, Remember to try to do your quiz in atempts. Good luck! ︾︾︾︾
Next
Question 1/6
Next
Question 2/6
Next
Question 3/6
Next
Question 4/6
Next
Question 5/6
Next
Question 6/6
Next
The end
By: Oleg
Thank you for your attencion