cyber security >>

In the realm of our expanding electronic world, cyber security is probably one of the most critical and important issues. The increasing security threats, both internal and external, requires organisations to seek for protection for the computing and communication networks in order to ensure business continuity. Exposure to threats from hostile sources include industrial spying, malware and viruses, denial of service, phishing, impersonation etc.

​​Cyber security is defined as confidentiality maintenance, data integrity, reliability, availability and redundancy.
The cyber security elements shall cover all communication and computing layers including:


  • Cabling Infrastructure
  • Networking (Comm. lines, Switches, Firewalls)
  • System and Computing (Servers, Operating Systems, Databases)
  • Interfaces to other networks/systems
  • Applications and Software

Awareness of the data security risks and threats that may impact the organisation functionality is imperative in order to maintain operation and business relevance. Organisations are required to balance between maximum stealth and protection from attacks and the need to enable access and service without complexities or delays. Tailoring a best fit protection suit to align with business requirements include internal and external perimeter protection technologies as well as procedures with regards to data preservation keeping. The following list describes the best known solutions to control and manage cyber security:

  • Firewall (FW)
  • Antivirus (AV)
  • Web Application Firewall (WAF)
  • Intrusion Prevention System (IPS)
  • Network Access Control (NAC)
  • Security Information Management (SIM)
  • Data Loss Prevention (DLP)
  • Content Inspection
  • Master Data Management (MDM)
  • Secure Sockets Layer Virtual Private Network (SSL VPN)
  • Patch Management
  • Logical Hardening​

The following figure describes the protection layers: