McCumber cube presentation
Zeticus Oleg Juarez Malinko
Created on June 12, 2023
Over 30 million people create interactive content in Genially
Check out what others have designed:
MODALS 1 BACH MARIO GAME
Quizzes
ANIMALS BY CATEGORY
Quizzes
DRACULA ESL
Quizzes
TRUE FALSE GEOGRAPHY
Quizzes
ENGLISH SCHOOL VOCABULARY
Quizzes
PARTS OF SPEECH REVIEW
Quizzes
RECYCLING SORTING GAME
Quizzes
Transcript
EMPEZAR
By: Oleg
Cybersecurity Cube Quiz & Presentation
Information states: Storage Transmission Processing Click to go to page!
Desired goals: Confidenciality Integrity Availability Click to go to Page!
Safeguards: Policy & Practices Human factors Technology Click to go to page!
John McCumber Created the cube in 1991 and it is to establish a evaluation of information security and it is in a rubiks cobe like model. The cybersecurity cube has 3 main sides
What is it?
Next
Safeguards
Infor. States
Desired goals
Safeguards
Infor. States
Back
Desired goals
The First dimention commonly called CIA triad or Desired goals side and it is mostly targeted towards information, Confidenciality, Integrity, Availability, Providing protection to sensitive documents, to keep the integrity of the data,Availability: ensuring that information systems and services are accessible and operational when needed.Just some examples of what this side focuses on Some real world examples: Keeping sensitive data encrypted and safe, Keep your data and emails available for you at any time required, keeping the information in a non corrupted state.
Desired Goals 1st Dimention
Safeguards
Infor. States
Desired goals
Next
Back
Its main focus goes to three categories Storage: Data at Rest (DAR). Transmission: Data in Transit (DIT) & Processing its main goal is targeted to what hapens to data or informaton seither being stored, prossesed, or being sent out for storage in an information system, such as that stored in memory or on a magnetic tape or disk. Transmission is transferring data between information systems and Processing wich is performing operations on data in order to achieve a desired objective. Some examples: Transmission: Gmail sending your e-mail to the recipient, Having your google document stored in the cloud, Google processing your data to acomodate your prefferences better in the algorithm.
Safeguards
Information States 2nd Dimention
Infor. States
Desired goals
Next
Back
Examples: Providing Employee training protocols & Code of conduct,Risk management, Security policies Firewalls and Intrusion, Encryption, Endpoint protection
Safeguards refer to the measures put in place to protect and secure an organization's assets, systems, and data from cyber threats. This includes people-related safeguards such as employee training, access controls, and incident response, process-related safeguards like risk management, security policies, and change management, as well as technology-related safeguards such as firewalls, encryption, and endpoint protection.
Safeguards
Safeguards 3rd Dimention
Infor. States
Desired goals
Next
Back
If you do not understand something always feel free to click the home button to go to the start and reveiw again
You are now ready for the next step wich is the quizz this is the last page that is for you to go the last page!
Safeguards
The Next Step
Infor. States
Desired goals
Next
Back
You have begun the quiz, Keep your correct and wrong answers counted if you got anything wrong concider reveiwing it later. Now if you are ready to proceed click the Next button if you wish to reveiw the information once more click the Home button in the top corner, Remember to try to do your quiz in atempts. Good luck! ︾︾︾︾
Question 0/6
Next
Question 1/6
Next
Question 2/6
Next
Question 3/6
Next
Question 4/6
Next
Question 5/6
Next
Question 6/6
Next
By: Oleg
Thank you for your attencion
The end