67.2k views
0 votes
5 critical tenets of effective cyber defense according to CIS controls

Options:
A. Use weak passwords, ignore software updates, share login information, trust all incoming network traffic, keep sensitive data unencrypted
B. Inventory and control of hardware assets, continuous vulnerability assessment and remediation, controlled use of administrative privileges, secure configuration for hardware and software on mobile devices, data protection
C. Use a single password for all accounts, open all email attachments, disable firewalls, ignore security alerts, share confidential information online
D. Limit employee training, store data on external hard drives, rely on default security settings, use public Wi-Fi for work purposes, ignore security policies

User Wajid Khan
by
7.3k points

1 Answer

4 votes

Final answer:

The five critical tenets of effective cyber defense according to CIS controls are inventory and control of hardware assets, continuous vulnerability assessment and remediation, controlled use of administrative privileges, secure configuration, and data protection to ensure online privacy and security.

Step-by-step explanation:

The five critical tenets of effective cyber defense according to CIS controls are:

  • Inventory and control of hardware assets
  • Continuous vulnerability assessment and remediation
  • Controlled use of administrative privileges
  • Secure configuration for hardware and software on mobile devices
  • Data protection

These tenets are focused on enhancing the security of information systems and protecting sensitive data from cyber threats. Effective cyber defense strategies include using complex passwords and two-factor authentication, performing regular updates and patches to address vulnerabilities, securing administrative access, configuring devices securely, and encrypting sensitive data to prevent unauthorized access.

To further bolster security, individuals and organizations should be vigilant about protecting their credit and debit cards, mailboxes, and wallets, utilize anti-virus software, and stay informed about security best practices.

User Dteoh
by
6.9k points