SlideShare a Scribd company logo
‫الضوابط‬
‫األساسية‬
‫لالمن‬
‫السيبراني‬
🏴
☠️
•
‫الضوابط‬ ‫هذه‬ ‫تهدف‬
‫ٕلى‬‫ا‬
‫األدنـ‬ ‫الحد‬ ‫توفير‬
‫من‬ ‫ى‬
‫لألمن‬ ‫األساسية‬ ‫المتطلبات‬
‫السيبراني‬
‫الم‬
‫بنية‬
‫على‬
‫فضل‬ٔ‫ا‬
‫لتقليل‬ ‫والمعايير‬ ‫الممارسات‬
‫المخاطر‬
‫السيبرانية‬
‫المعلومات‬ ‫األصول‬ ‫على‬
‫ية‬
‫التهديدات‬ ‫من‬ ‫للجهات‬ ‫والتقنية‬
🔑
‫خذ‬ٔ‫ا‬‫وت‬
‫باالعتب‬ ‫الضوابط‬ ‫هذه‬
‫ار‬
‫المحاوراألساسية‬
‫يرتكز‬ ‫التي‬
‫األمن‬ ‫عليها‬
‫السيبراني‬
‫وهي‬ ‫؛‬
🚫
•
‫المعلومة‬ ‫سالمة‬
)
•
‫المعلومة‬ ‫توافر‬
)
‫األهداف‬
🔑
•
‫المعلومة‬ ‫سرية‬
)
‫األساسية‬ ‫األربعة‬ ‫المحاور‬
🧩
‫اإلستراتيجية‬
‫األشخاص‬
‫اإلجراء‬
‫التقنية‬
‫لأل‬ ‫األساسية‬ ‫الضوابط‬ ‫وهيكلية‬ ‫مكونات‬
‫من‬
‫السيبراني‬
🏴
☠️
•
‫حوكمة‬
‫االمن‬
‫السيبراني‬
🔓
•
‫االمن‬ ‫تعزيز‬
‫السيبراني‬
🔓
•
‫االمن‬ ‫صمود‬
‫السيبراني‬
🔓
•
‫االمن‬
‫السيبراني‬
‫المتعلق‬
🔓
•
‫االمن‬
‫السيبراني‬
‫النضمة‬
‫الصناعي‬ ‫التحكم‬
🔓
‫حوكمة‬
‫األمن‬
‫السيبراني‬
🏴
☠️
•
‫استراتجية‬
‫األمن‬
‫السيبراني‬
🚫
•
‫ضمان‬
‫سهام‬ٕ‫ا‬
‫لألمن‬ ‫العمل‬ ‫خطط‬
‫السيبراني‬
‫المتطل‬ ‫تحقيق‬ ‫في‬ ‫الجهة‬ ‫داخل‬ ‫واألهـداف‬
‫بات‬
‫التشريعية‬
•
‫األمن‬ ‫ادارة‬
‫السيبراني‬
🔑
•
‫يتعلق‬ ‫فيما‬ ‫للجهة‬ ‫الصالحية‬ ‫صاحب‬ ‫ودعم‬ ‫التزام‬ ‫ضمان‬
‫دارة‬ٕ‫ا‬‫ب‬
‫األ‬ ‫برامج‬ ‫وتطبيق‬
‫من‬
‫السيبراني‬
‫العالق‬ ‫ذات‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫للمتطلبات‬ ‫ا‬ً‫ق‬‫وف‬ ‫الجهة‬ ‫تلك‬ ‫في‬
‫ة‬
‫و‬ ‫سياسات‬
‫اجرا‬
’
‫ات‬
‫االمن‬
‫السيبراني‬
🧩
‫توثيق‬
‫ونشرمتطلبات‬
‫األمن‬
‫السيبراني‬
،‫بها‬ ‫الجهة‬ ‫والتزام‬
‫األمن‬ ‫إدارة‬
‫السيبراني‬
• ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫ٕستراتيجية‬‫ا‬
‫األمـن‬
‫السيبراني‬
‫ودعمها‬ ‫للجهة‬
• ‫يجب‬
‫ٕنشاء‬‫ا‬
‫ة‬ً‫ٕدار‬‫ا‬
‫باألمن‬ ‫معنية‬
‫السيبراني‬
‫في‬
‫عن‬ ‫مستقلة‬ ‫الجهة‬
‫ٕدارة‬‫ا‬
‫المعلومات‬ ‫تقنية‬
‫واالتصاالت‬
• ‫باألمن‬ ‫المعنية‬ ‫اإلدارة‬ ‫على‬ ‫يجب‬
‫السيبراني‬
‫سياسات‬ ‫تحديد‬ ‫الجهة‬ ‫في‬
‫ٕجــراءات‬‫ا‬‫و‬
‫األمن‬
‫السيبراني‬
‫وما‬
‫األمن‬ ‫تعزيز‬
‫السيبراني‬
🏴
☠️
•
‫األصول‬ ‫إدارة‬
🚫
•
‫كد‬ٔ‫ا‬‫للت‬
‫من‬
‫ن‬ٔ‫ا‬
‫لديها‬ ‫الجهة‬
‫مة‬ٔ‫ي‬‫قا‬
‫التفاصيل‬ ‫تشمل‬ ‫لألصول‬ ‫وحديثة‬ ‫دقيقة‬ ‫جرد‬
‫العالقة‬ ‫ذات‬
‫األصول‬ ‫لجميع‬
‫والصالحيات‬ ‫الدخول‬ ‫هويات‬ ‫إدارة‬
🔑
‫األمن‬ ‫حماية‬ ‫ضمان‬
‫السيبراني‬
‫المنطقي‬ ‫للوصول‬
(
Logical Access
)
‫ٕلى‬‫ا‬
‫المعلوماتية‬ ‫األصول‬
‫من‬ ‫للجهة‬ ‫والتقنية‬
‫جل‬ٔ‫ا‬
‫به‬ ‫المصرح‬ ‫غير‬ ‫الوصول‬ ‫منع‬
‫األجهزة‬ ‫حماية‬
‫واالنضمة‬
🧩
‫األنظمة‬ ‫حماية‬ ‫ضمان‬
‫جهزة‬ٔ‫ا‬‫و‬
‫ذلك‬ ‫في‬ ‫بما‬ ‫المعلومات‬ ‫معالجة‬
‫جهزة‬ٔ‫ا‬
‫التحتي‬ ‫والبنى‬ ‫المستخدمين‬
‫للجهة‬ ‫ة‬
‫الشبكات‬ ‫امن‬ ‫إدارة‬
•
‫األمن‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫السيبراني‬
‫والتقن‬ ‫المعلوماتية‬ ‫األصول‬ ‫إلدارة‬
‫ية‬
‫للجهة‬
.
•
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبراني‬
‫إلدا‬
‫رة‬
‫للجهة‬ ‫والتقنية‬ ‫المعلوماتية‬ ‫األصول‬
.
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبراني‬
‫إلدارة‬
‫هويات‬
‫الجهة‬ ‫في‬ ‫والصالحيات‬ ‫الدخول‬
.
‫ا‬
‫المحمولة‬ ‫األجهزة‬ ‫من‬
‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬
‫األمن‬
‫السيبراني‬
‫الخاصة‬
‫من‬ٔ‫ا‬‫ب‬
‫األجهز‬
‫ة‬
‫الشخصية‬ ‫واألجهزة‬ ‫المحمولة‬
‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬
‫السيبر‬
‫اني‬
‫الخاصة‬
‫من‬ٔ‫ا‬‫ب‬
‫المحمولة‬ ‫األجهزة‬
‫جهزة‬ٔ‫ا‬‫و‬
(
BYOD)
‫للجهة‬
.
‫األمن‬ ‫صمود‬
‫السيبراني‬
🏴
☠️
•
‫االمن‬ ‫صمود‬ ‫جوانب‬
‫السيبراني‬
‫االعمال‬ ‫إدارة‬ ‫في‬
🚫
•
‫األمن‬ ‫صمود‬ ‫متطلبات‬ ‫توافر‬ ‫ضمان‬
‫السيبراني‬
‫في‬
‫ٕدارة‬‫ا‬
‫استمرارية‬
‫عمال‬ٔ‫ا‬
‫الجهة‬
.
‫معالج‬ ‫وضمان‬
‫وتقليل‬ ‫ة‬
‫للجهة‬ ‫الحرجة‬ ‫اإللكترونية‬ ‫الخدمات‬ ‫في‬ ‫االضطرابات‬ ‫على‬ ‫المترتبة‬ ‫اآلثار‬
‫نظمة‬ٔ‫ا‬‫و‬
‫جهزة‬ٔ‫ا‬‫و‬
‫معال‬
‫جة‬
‫معلوماتها‬
‫االمن‬
‫السيبراني‬
‫المتعلق‬
‫باالطراف‬
‫والحوس‬ ‫الخارجية‬
‫بة‬
‫السحابية‬
🏴
☠️
•
‫االمن‬
‫السيبراني‬
‫المتعلق‬
‫باالطراف‬
‫الخارجية‬
🚫
•
‫حماية‬ ‫ضمان‬
‫صول‬ٔ‫ا‬
‫األمن‬ ‫مخاطر‬ ‫من‬ ‫الجهة‬
‫السيبراني‬
‫الخارجية‬ ‫باألطراف‬ ‫المتعلقة‬
(
‫بما‬
‫المدارة‬ ‫الخدمات‬ ‫و‬ ‫المعلومات‬ ‫لتقنية‬ ‫االسناد‬ ‫خدمات‬ ‫ذلك‬ ‫في‬
•
‫االمن‬
‫السيبراني‬
‫السحابية‬ ‫بالحوسبة‬ ‫المتعلق‬
🔑
•
‫المخاطر‬ ‫معالجة‬ ‫ضمان‬
‫السيبرانية‬
‫األمن‬ ‫متطلبات‬ ‫وتنفيذ‬
‫السيبراني‬
‫للحوسبة‬
‫السحابية‬
‫بشكل‬ ‫واالستضافة‬
‫م‬ٔ‫ي‬‫مال‬
‫التنظي‬ ‫واإلجــراءات‬ ‫للسياسات‬ ‫ا‬ً‫ق‬‫وف‬ ‫وذلك‬ ،‫عال‬ّ‫ف‬‫و‬
،‫للجهة‬ ‫مية‬
‫والتنظيمية‬ ‫التشريعية‬ ‫والمتطلبات‬
‫االمن‬
‫السيبراني‬
‫النتظمة‬
‫الصناعي‬ ‫التحكم‬
🏴
☠️
•
‫حماية‬
‫اجهازة‬
‫الصناعي‬ ‫التحكم‬ ‫وأنظمة‬
🚫
•
‫ضمان‬
‫ٕدارة‬‫ا‬
‫األمن‬
‫السيبراني‬
‫وسرية‬ ‫وسالمة‬ ‫توافر‬ ‫لحماية‬ ‫وفعال‬ ‫سليم‬ ‫بشكل‬
‫صول‬ٔ‫ا‬
‫ال‬ ‫الجهة‬
‫متعلقة‬
‫جهزة‬ٔ‫ا‬‫ب‬
‫نظمة‬ٔ‫ا‬‫و‬
‫الصناعي‬ ‫التحكم‬
(OT/ICS)
Presentation by
• ‫الشمري‬ ‫عبدالعزيز‬
• ‫فاضل‬ ‫عبدهللا‬
• ‫االمن‬
‫السيبراني‬
• ‫م‬
/
‫إبراهيم‬
‫العديني‬

More Related Content

What's hot

презентация1
презентация1презентация1
презентация1
sagidullaa01
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
InfosecTrain
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
Fidelis Cybersecurity
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
ForgeRock
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA Cyber Security
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
SafeNet
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
FireEye, Inc.
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
Marneil Sanchez
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
 
Cybersecurity
CybersecurityCybersecurity
Cyber security
Cyber securityCyber security
Cyber security
Eduonix
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
Kroll
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 

What's hot (20)

презентация1
презентация1презентация1
презентация1
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 

Similar to Project cyper

Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems PolicyAli Sadhik Shaik
 
C I S C r i t i c a l C o n t r o l s
C I S  C r i t i c a l  C o n t r o l  sC I S  C r i t i c a l  C o n t r o l  s
C I S C r i t i c a l C o n t r o l s
ssuserd4ef17
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
Symantec
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
DorcusSitali
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
rabeetkashif
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
AT-NET Services, Inc. - Charleston Division
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
ssuserf98dd4
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
Zaynah Zameer
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
Hasna Zameer
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Ben Rothke
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
BAINIDA
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
EC-Council
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Shawn Tuma
 
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh KumarNeed for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
Dinesh O Bareja
 

Similar to Project cyper (20)

Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
C I S C r i t i c a l C o n t r o l s
C I S  C r i t i c a l  C o n t r o l  sC I S  C r i t i c a l  C o n t r o l  s
C I S C r i t i c a l C o n t r o l s
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf2023 ITM Short Course - Week 1.pdf
2023 ITM Short Course - Week 1.pdf
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 
5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown5 ways to avoid cyber security takedown
5 ways to avoid cyber security takedown
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
Global CCISO Forum 2018 | Anthony Dupree "Evolving Role of the CISO: Reshapin...
 
Ccie security 01
Ccie security 01Ccie security 01
Ccie security 01
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh KumarNeed for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
Need for a Comprehensive Cyber Security Policy By Dr.S.Jagadeesh Kumar
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 

Recently uploaded

standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
ukgaet
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
StarCompliance.io
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
nscud
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
theahmadsaood
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 

Recently uploaded (20)

standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
一比一原版(UVic毕业证)维多利亚大学毕业证成绩单
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
一比一原版(CBU毕业证)卡普顿大学毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 

Project cyper

  • 1. ‫الضوابط‬ ‫األساسية‬ ‫لالمن‬ ‫السيبراني‬ 🏴 ☠️ • ‫الضوابط‬ ‫هذه‬ ‫تهدف‬ ‫ٕلى‬‫ا‬ ‫األدنـ‬ ‫الحد‬ ‫توفير‬ ‫من‬ ‫ى‬ ‫لألمن‬ ‫األساسية‬ ‫المتطلبات‬ ‫السيبراني‬ ‫الم‬ ‫بنية‬ ‫على‬ ‫فضل‬ٔ‫ا‬ ‫لتقليل‬ ‫والمعايير‬ ‫الممارسات‬ ‫المخاطر‬ ‫السيبرانية‬ ‫المعلومات‬ ‫األصول‬ ‫على‬ ‫ية‬ ‫التهديدات‬ ‫من‬ ‫للجهات‬ ‫والتقنية‬ 🔑
  • 2. ‫خذ‬ٔ‫ا‬‫وت‬ ‫باالعتب‬ ‫الضوابط‬ ‫هذه‬ ‫ار‬ ‫المحاوراألساسية‬ ‫يرتكز‬ ‫التي‬ ‫األمن‬ ‫عليها‬ ‫السيبراني‬ ‫وهي‬ ‫؛‬ 🚫 • ‫المعلومة‬ ‫سالمة‬ ) • ‫المعلومة‬ ‫توافر‬ ) ‫األهداف‬ 🔑 • ‫المعلومة‬ ‫سرية‬ ) ‫األساسية‬ ‫األربعة‬ ‫المحاور‬ 🧩 ‫اإلستراتيجية‬ ‫األشخاص‬ ‫اإلجراء‬ ‫التقنية‬
  • 3. ‫لأل‬ ‫األساسية‬ ‫الضوابط‬ ‫وهيكلية‬ ‫مكونات‬ ‫من‬ ‫السيبراني‬ 🏴 ☠️ • ‫حوكمة‬ ‫االمن‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫تعزيز‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫صمود‬ ‫السيبراني‬ 🔓 • ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ 🔓 • ‫االمن‬ ‫السيبراني‬ ‫النضمة‬ ‫الصناعي‬ ‫التحكم‬ 🔓
  • 4. ‫حوكمة‬ ‫األمن‬ ‫السيبراني‬ 🏴 ☠️ • ‫استراتجية‬ ‫األمن‬ ‫السيبراني‬ 🚫 • ‫ضمان‬ ‫سهام‬ٕ‫ا‬ ‫لألمن‬ ‫العمل‬ ‫خطط‬ ‫السيبراني‬ ‫المتطل‬ ‫تحقيق‬ ‫في‬ ‫الجهة‬ ‫داخل‬ ‫واألهـداف‬ ‫بات‬ ‫التشريعية‬ • ‫األمن‬ ‫ادارة‬ ‫السيبراني‬ 🔑 • ‫يتعلق‬ ‫فيما‬ ‫للجهة‬ ‫الصالحية‬ ‫صاحب‬ ‫ودعم‬ ‫التزام‬ ‫ضمان‬ ‫دارة‬ٕ‫ا‬‫ب‬ ‫األ‬ ‫برامج‬ ‫وتطبيق‬ ‫من‬ ‫السيبراني‬ ‫العالق‬ ‫ذات‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫للمتطلبات‬ ‫ا‬ً‫ق‬‫وف‬ ‫الجهة‬ ‫تلك‬ ‫في‬ ‫ة‬ ‫و‬ ‫سياسات‬ ‫اجرا‬ ’ ‫ات‬ ‫االمن‬ ‫السيبراني‬ 🧩 ‫توثيق‬ ‫ونشرمتطلبات‬ ‫األمن‬ ‫السيبراني‬ ،‫بها‬ ‫الجهة‬ ‫والتزام‬
  • 5. ‫األمن‬ ‫إدارة‬ ‫السيبراني‬ • ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫ٕستراتيجية‬‫ا‬ ‫األمـن‬ ‫السيبراني‬ ‫ودعمها‬ ‫للجهة‬ • ‫يجب‬ ‫ٕنشاء‬‫ا‬ ‫ة‬ً‫ٕدار‬‫ا‬ ‫باألمن‬ ‫معنية‬ ‫السيبراني‬ ‫في‬ ‫عن‬ ‫مستقلة‬ ‫الجهة‬ ‫ٕدارة‬‫ا‬ ‫المعلومات‬ ‫تقنية‬ ‫واالتصاالت‬ • ‫باألمن‬ ‫المعنية‬ ‫اإلدارة‬ ‫على‬ ‫يجب‬ ‫السيبراني‬ ‫سياسات‬ ‫تحديد‬ ‫الجهة‬ ‫في‬ ‫ٕجــراءات‬‫ا‬‫و‬ ‫األمن‬ ‫السيبراني‬ ‫وما‬
  • 6. ‫األمن‬ ‫تعزيز‬ ‫السيبراني‬ 🏴 ☠️ • ‫األصول‬ ‫إدارة‬ 🚫 • ‫كد‬ٔ‫ا‬‫للت‬ ‫من‬ ‫ن‬ٔ‫ا‬ ‫لديها‬ ‫الجهة‬ ‫مة‬ٔ‫ي‬‫قا‬ ‫التفاصيل‬ ‫تشمل‬ ‫لألصول‬ ‫وحديثة‬ ‫دقيقة‬ ‫جرد‬ ‫العالقة‬ ‫ذات‬ ‫األصول‬ ‫لجميع‬ ‫والصالحيات‬ ‫الدخول‬ ‫هويات‬ ‫إدارة‬ 🔑 ‫األمن‬ ‫حماية‬ ‫ضمان‬ ‫السيبراني‬ ‫المنطقي‬ ‫للوصول‬ ( Logical Access ) ‫ٕلى‬‫ا‬ ‫المعلوماتية‬ ‫األصول‬ ‫من‬ ‫للجهة‬ ‫والتقنية‬ ‫جل‬ٔ‫ا‬ ‫به‬ ‫المصرح‬ ‫غير‬ ‫الوصول‬ ‫منع‬ ‫األجهزة‬ ‫حماية‬ ‫واالنضمة‬ 🧩 ‫األنظمة‬ ‫حماية‬ ‫ضمان‬ ‫جهزة‬ٔ‫ا‬‫و‬ ‫ذلك‬ ‫في‬ ‫بما‬ ‫المعلومات‬ ‫معالجة‬ ‫جهزة‬ٔ‫ا‬ ‫التحتي‬ ‫والبنى‬ ‫المستخدمين‬ ‫للجهة‬ ‫ة‬
  • 7. ‫الشبكات‬ ‫امن‬ ‫إدارة‬ • ‫األمن‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫السيبراني‬ ‫والتقن‬ ‫المعلوماتية‬ ‫األصول‬ ‫إلدارة‬ ‫ية‬ ‫للجهة‬ . • ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبراني‬ ‫إلدا‬ ‫رة‬ ‫للجهة‬ ‫والتقنية‬ ‫المعلوماتية‬ ‫األصول‬ . ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبراني‬ ‫إلدارة‬ ‫هويات‬ ‫الجهة‬ ‫في‬ ‫والصالحيات‬ ‫الدخول‬ .
  • 8. ‫ا‬ ‫المحمولة‬ ‫األجهزة‬ ‫من‬ ‫متطلبات‬ ‫واعتماد‬ ‫وتوثيق‬ ‫تحديد‬ ‫يجب‬ ‫األمن‬ ‫السيبراني‬ ‫الخاصة‬ ‫من‬ٔ‫ا‬‫ب‬ ‫األجهز‬ ‫ة‬ ‫الشخصية‬ ‫واألجهزة‬ ‫المحمولة‬ ‫األمن‬ ‫متطلبات‬ ‫تطبيق‬ ‫يجب‬ ‫السيبر‬ ‫اني‬ ‫الخاصة‬ ‫من‬ٔ‫ا‬‫ب‬ ‫المحمولة‬ ‫األجهزة‬ ‫جهزة‬ٔ‫ا‬‫و‬ ( BYOD) ‫للجهة‬ .
  • 9. ‫األمن‬ ‫صمود‬ ‫السيبراني‬ 🏴 ☠️ • ‫االمن‬ ‫صمود‬ ‫جوانب‬ ‫السيبراني‬ ‫االعمال‬ ‫إدارة‬ ‫في‬ 🚫 • ‫األمن‬ ‫صمود‬ ‫متطلبات‬ ‫توافر‬ ‫ضمان‬ ‫السيبراني‬ ‫في‬ ‫ٕدارة‬‫ا‬ ‫استمرارية‬ ‫عمال‬ٔ‫ا‬ ‫الجهة‬ . ‫معالج‬ ‫وضمان‬ ‫وتقليل‬ ‫ة‬ ‫للجهة‬ ‫الحرجة‬ ‫اإللكترونية‬ ‫الخدمات‬ ‫في‬ ‫االضطرابات‬ ‫على‬ ‫المترتبة‬ ‫اآلثار‬ ‫نظمة‬ٔ‫ا‬‫و‬ ‫جهزة‬ٔ‫ا‬‫و‬ ‫معال‬ ‫جة‬ ‫معلوماتها‬
  • 10. ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ ‫باالطراف‬ ‫والحوس‬ ‫الخارجية‬ ‫بة‬ ‫السحابية‬ 🏴 ☠️ • ‫االمن‬ ‫السيبراني‬ ‫المتعلق‬ ‫باالطراف‬ ‫الخارجية‬ 🚫 • ‫حماية‬ ‫ضمان‬ ‫صول‬ٔ‫ا‬ ‫األمن‬ ‫مخاطر‬ ‫من‬ ‫الجهة‬ ‫السيبراني‬ ‫الخارجية‬ ‫باألطراف‬ ‫المتعلقة‬ ( ‫بما‬ ‫المدارة‬ ‫الخدمات‬ ‫و‬ ‫المعلومات‬ ‫لتقنية‬ ‫االسناد‬ ‫خدمات‬ ‫ذلك‬ ‫في‬ • ‫االمن‬ ‫السيبراني‬ ‫السحابية‬ ‫بالحوسبة‬ ‫المتعلق‬ 🔑 • ‫المخاطر‬ ‫معالجة‬ ‫ضمان‬ ‫السيبرانية‬ ‫األمن‬ ‫متطلبات‬ ‫وتنفيذ‬ ‫السيبراني‬ ‫للحوسبة‬ ‫السحابية‬ ‫بشكل‬ ‫واالستضافة‬ ‫م‬ٔ‫ي‬‫مال‬ ‫التنظي‬ ‫واإلجــراءات‬ ‫للسياسات‬ ‫ا‬ً‫ق‬‫وف‬ ‫وذلك‬ ،‫عال‬ّ‫ف‬‫و‬ ،‫للجهة‬ ‫مية‬ ‫والتنظيمية‬ ‫التشريعية‬ ‫والمتطلبات‬
  • 11. ‫االمن‬ ‫السيبراني‬ ‫النتظمة‬ ‫الصناعي‬ ‫التحكم‬ 🏴 ☠️ • ‫حماية‬ ‫اجهازة‬ ‫الصناعي‬ ‫التحكم‬ ‫وأنظمة‬ 🚫 • ‫ضمان‬ ‫ٕدارة‬‫ا‬ ‫األمن‬ ‫السيبراني‬ ‫وسرية‬ ‫وسالمة‬ ‫توافر‬ ‫لحماية‬ ‫وفعال‬ ‫سليم‬ ‫بشكل‬ ‫صول‬ٔ‫ا‬ ‫ال‬ ‫الجهة‬ ‫متعلقة‬ ‫جهزة‬ٔ‫ا‬‫ب‬ ‫نظمة‬ٔ‫ا‬‫و‬ ‫الصناعي‬ ‫التحكم‬ (OT/ICS)
  • 12. Presentation by • ‫الشمري‬ ‫عبدالعزيز‬ • ‫فاضل‬ ‫عبدهللا‬ • ‫االمن‬ ‫السيبراني‬ • ‫م‬ / ‫إبراهيم‬ ‫العديني‬