Welcome to cyberhub.dev

University of Sandiego - Cybersecurity Operations and Leadership Master's (CSOL) Capstone

Naveen's Avatar'

Security Architecture

The security architecture artifacts are valuable tools for maintaining consistency and traceability in security design because they break up the complexity to present greater simplicity and thus make the design activity more comfortable to manage. One of the ways to simplify complexity is to crea...

Naveen's Avatar'

Secure Software Design and Development

A Software Development Life Cycle (SDLC) is a process used by organizations to build an application from its inception to its decommission. It has several phases, from requirement gathering, planning, architecture, coding, testing, release, and maintenance. In the past, security was only consider...

Naveen's Avatar'

Risk Management

The fundamental goals of cybersecurity are to manage the risk to information and information systems since they are subject to threats that can have adverse e!ects on organizational operations, assets, and individuals. Threats can compromise the confidentiality, integrity, and availability of inf...

Naveen's Avatar'

Privacy Policies

HIC, Inc. has three privacy domains – PHI, corporate and public. Each of these domains has specific privacy requirements which are explained below. PHI Domain PHI is individually identifiable health information, including demographic data, that relates to (a) the individual’s past, present or f...

Naveen's Avatar'

Policy Implementation, Enforcement, and Compliance

HIC, Inc. needs to maintain regulatory compliance to protect the confidentiality, integrity, and availability of protected health information (PHI) and information assets. It has developed various security policies following all applicable laws and regulations and standards. However, the company ...

Naveen's Avatar'

Corporate Mobility Policy

The scope of this policy applies to all employees, including part-time and contract employees who wish to use their own devices to access the company’s network, applications, and services. Acceptable Use Employees are allowed to use their mobile devices to access the company resources throug...

Naveen's Avatar'

Operational Policy

Security policies are a collection of documents that starts with a set of principles that communicate standard rules across the organization. The implementation of the principles is detailed in the policy documents. These policy documents also outline the controls, actions, and processes to be pe...

Naveen's Avatar'

Network Visualization and Vulnerability Detection

Network visualization and vulnerability detection is a process and tool that security professional utilize to help them understand network tra!c data or log entries to identify security threats and vulnerabilities within the network. By understanding what’s happening on the network will help dete...

Naveen's Avatar'

Management and Cyber Security

The purpose of the Information System Security Plan (ISSP) is to help the business determine the ideal path for achieving their business objectives. It outlines the responsibilities and accepted behavior of all individuals who access the system. The system security plan should be regarded as docu...

Naveen's Avatar'

Incident Response and Computer Network Forensics

Every organization in today’s digital world experiences cyber incidents such as network intrusion, information leaks, and data breaches. The response to these incidents needs a structured process and security tools to quickly and safely extract evidence to identify how the intruders gained access...

Naveen's Avatar'

Cyber Threat Intelligence

The Cyber Threat Intelligence (CTI) examines the fundamentals of open source intelligence, refining the information into actionable intelligence, and the basics of the intelligence cycle with particular emphasis on anticipating threats to the cyber domain. The CTI can be broken into three types o...

Naveen's Avatar'

Cryptography

Cryptography is art and science that applies complex mathematics and logic to design strong encryption. Encryption is the process of disguising the data so that its meaning is not apparent. Cryptography is one of the tools used in information security to assist in ensuring the primary goals of co...

Naveen's Avatar'

Cyber Security Fundamentals

The progression of computers and information technology has been explosive with the introduction of the internet. It has brought immense benefits on how we communicate and collaborate with people around the world to develop technologies that help advance in the fields of manufacturing, space, me...