In order to create a strong cybersecurity policy in Adius, their security professionals must comprehend key elements including servers, network and network components, access control procedures, mobile computing and telecommuting, authentication procedures, and architecture frameworks. Every portion of computer hardware happens to have its individual exclusive security necessities within a cyber environment, thus, interlocking all the devices and increasing complexity. These devices entail smart managing and must be ruled by policy, standards, and procedure. A method of attaining great cybersecurity practice includes utilizing overall security architectures, such as ISO 17799 - considered the International Organization for Standardization (ISO) primary information security management standard.
The ISO standard happens to be an assortment of good practice relating to Information Technology along with cybersecurity. This could be applied in all kinds of organizations. The twelve chief facets of the standard contain an extensive array of material extending from risk assessments and treatment systems policies, to additional zones like access control within cybersecurity, human resource, and environment security. It includes twelve main domains, all including some objective (Theoharidou, et al., 2005).
Most of the standards, which Adius needs to develop, are performance standards. These should be measured and evaluated and must be able to lead to ISO certification. The X.805 are security standards established for the International Telecommunication Union (ITU). X.805 are standards for security architectures of cyber-systems used by organizations such as Adius to provide end to end communication along with providing wide-ranging network views of the safety along with conforms to an ISO standard. This is also relevant to networks’ technologies and architectures (wireless, voice, data, and videos), along with to various kinds of business networks