Cybersecurity

By | June 18, 2019

Cybersecurity is the management practice governing all of the digital equipment and software, executing and available to execute, on connected corporeal, virtual, and cloud devices, within a proprietary process domain, to enable and limit the use of the equipment and software to achieve designed and intended purposes under the [CIA] rubric of information confidentiality, integrity, and availability.

This management requires:

  • Discovery and description – enumeration – of all hardware and software process elements, protocols, and connection interfaces between them, in the processing domain.
  • Understanding the operational potential and optimal technical configuration of all hardware and software elements and connection protocols in the processing domain.
  • Diagnosis and assessment of versions and upgrade state for all elements to compare against known exploit vulnerabilities and to recommend potential patching.
  • Minimizing threat exposure through configuration recommendations that remove access to services and ports from all unauthorized sources, and specifically grant access to services and ports, on a least-privilege basis, to authorized sources.
  • Identification and removal of any unauthorized out-of-band processes.
  • Fluency in the tools and methods used to expose and analyze the above requirements.

Leave a Reply

Your email address will not be published. Required fields are marked *