Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protecting the Organization - Coggle Diagram
Protecting the Organization
Cybersecurity Devices and Technologies
Security Appliances
Firewalls
Network layer firewall
Transport layer firewall
Application layer firewall
Context aware layer firewall
Proxy server
Reverse proxy server
Network address translation (NAT) firewall
Host-based firewall
Intrusion prevention systems
Virtual private networks
Antimalware or antivirus
Other security devices
Routers
Port Scanning
Intrusion Detection and Prevention Systems
IDS
IPS
Real-Time Detection
Protecting Against Malware
Secure Operations Center team
Incidence Response team
Threat Intelligence team
Security Infrastructure Engineering team
Security Best Practices
Perform a risk assessment
Create a security policy
Physical security measures
Human resources security measures
Perform and test backups
Maintain security patches and updates
Employ access controls
Regularly test incident response
Implement a network monitoring, analytics and management tool
Implement network security devices
Implement a comprehensive endpoint security solution
Educate users
Encrypt data
Behavior Approach to Cybersecurity
Behavior-Based Security
Honeypots
Cisco’s Cyber Threat Defense Solution Architecture
NetFlow
Penetration Testing
Step 4: Maintaining access
Step 5: Analysis and reporting
Step 3: Gaining access
Step 2: Scanning
Step 1: Planning
Impact Reduction
Communicate the issue
Be sincere and accountable
Provide the details
Find the cause
Apply lessons learned
Check, and check again
Educate!
What Is Risk Management?
Cisco's Approach to Cybersecurity
Security Playbook
A security playbook is a collection of repeatable queries or reports that outline a standardized process for incident detection and response
Tools for Incident Detection and Prevention
Security Information and Event Management (SIEM)
Data Loss Prevention (DLP)
Cisco's CSIRT
Defense Security Information Exchange (DSIE)
National Safety Information Exchange (NSIE)
Forum of Incident Response and Security Teams (FIRST)
Computer Security Incident Response Team (CSIRT)
DNS Operations Analysis and Research Center (DNS-OARC)