Please enable JavaScript.
Coggle requires JavaScript to display documents.
Understanding defense, 1730907627238647072459988305854, 173090764428327749…
Understanding defense
Defense-in-Depth
Assets, Vulnerabilities, Threats
Cybersecurity analysts must prepare for any type of attack. It is their job to secure the assets of the organization’s network.
Identify Assets
As an organization grows, so do its assets. Consider the number of assets a large organization would have to protect. It may also acquire other assets through mergers with other companies. The result is that many organizations only have a general idea of the assets that need to be protected.
Identify Vulnerabilities
Threat identification provides an organization with a list of likely threats for a particular environment. When identifying threats, it is important to ask several questions
Identify Threats
Organizations must use a defense-in-depth approach to identify threats and secure vulnerable assets. This approach uses multiple layers of security at the network edge, within the network, and on network endpoints.
-
Security Policies, Regulations, and Standards
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-