NC3 leads the national effort to protect and enhance the resilience of the nation’s physical and cyber infrastructure. This website provides cybersecurity resources guidelines, policies, and best practices for government agencies, SMEs and other organizations.

Cybersecurity Steps

1. Risk Management  A risk management should be set up which mainly consists of applicable policies, guidelines and practices that must be established, streamlined and should effectively be communicated to all the employees, contractors, and suppliers to assure that everyone is aware of the approach, e.g., how decisions are made, about risk boundaries, etc. 2.…

Read More

Cybersecurity Framework

Cybersecurity Framework Function Areas Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. The activities in the Identify Function are foundational for effective use of the Framework. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enable an organization to focus and prioritize…

Read More

Attack Vectors

Attack vectors help unauthorized elements to exploit the vulnerabilities in the system or network, including the human element. Examples of attack vectors are email attachments, pop-up windows, deception, chat rooms, viruses, and instant messages. Attack surface The sum-total of points on a network where attacks can occur where an unauthorized user (the “attacker”) can try to manipulate or…

Read More

Penetration Testing

Penetration testing is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.

Read More