Summary
Cybersecurity is everyone’s responsibility and has the basics of confidentiality, integrity, and availability. Secure access to assets is defined with the process of identification, authentication, and authorization. Once access is given to a user, they are audited for their accountability in their day-to-day work. Several layers of security are put in place in an organization with various controls to achieve defense in depth. Defense in depth helps in such a way that if one or more controls fail, another control can possibly detect a breach or threat.
Security considerations for hardware and software are different. Physical security of the hardware and software assets is important too. Access control decides who can access what assets in an organization. Access controls can be for files on an operating system, inbound and outbound traffic on a network, or physical access to buildings and assets. The roles of users are important too because a corporation decides what role each user is given and access can be dependent on that given role. In this chapter, we also demonstrated various aspects of security in an organization.