Learn #Cybersecurity
The twelve domains serve as a common basis for developing organizational security standards and effective security management practices.
They also help to facilitate communication between organizations.
These domains are applicable across various companies including #crypto companies.
Cryptocurrency and Blockchain organizations need to have dedicated cyber security team that will constantly and effectively manage the computers, systems and networks keeping it secure and away from threats perpetrated by hackers and attackers. Hence, understanding these cyber security domain is critical.
#Web3 and #crypto companies understanding the domains, would mean they are putting crypto users, infrastructures, systems and networks safety and security first.
Risk Management: Determines the quantitative and qualitative value of risk related to a specific situation or recognized threats.
Security Policies: A document that addresses the constraints and behavior of members of an organization and often specifies how data can be accessed and what data is accessible to whom
Organization of Information Security: A governance model set by an organization for information security.
Assets Management: An inventory of and classification scheme for information asset.
Human Resources in Security: Addresses security procedure relating to employee joining, moving within and leaving an organization.
Physical and Environmental Security: This describes the protection of the computer facilities within an organization
Communications and Operation Management: Management of technical security control in systems and networks.
Information Systems Acquisition, Development and Maintenance: Describes the integration of security into systems.
Access Control: Describes the restriction of access rights to networks, systems, applications, functions, and data
Information Security Incident Management: Describes how to anticipate and respond to information security breaches.
Business Continuity Management: Describes the protection, maintenance, and recovery of business critical processes and systems.
Compliance: Describes the process of ensuring conformance with information policies, standards, and regulations.
Every #crypto project team and founders with dedicated cybersecurity team need to read and be aware of these domains

