Further details to be provided… Contact us and let us know if you find this website useful and are eager for this section to be completed.
Cyber defense: Activites intended to eliminate or mitigate the effects of a cyber attack.
Nobody ever defended anything successfully; there is only attack and attack and attack some more. George S. Patton
Defense Classification | Assumptions | Includes | Temporality | Perimeter Security | Internal Security |
---|---|---|---|---|---|
Unprotected (open system) | N/A [Dismissive or skeptical re Cyber Risks] | N/A | N/A | Details to be provided… | Details to be provided… |
Static Perimeter-Based Security | Relatively static HW/SW configuration [Only external cyber threats defended; HW trusted & SW distrusted] | Firewall + Anti-Virus SW | Static | Details to be provided… | Details to be provided… |
Enhanced Perimeter-Based Security | All of the above [Only external cyber threats considered; both HW & SW distrusted] | All of the above + Intrusion Detection System (IDS) / Intrusion Protection System (IPS) | Static++ | Details to be provided… | Details to be provided… |
Dynamic Moving Target Defense (MTD) | All of the above [Both external & external cyber threats considered; all HW & SW assumed compromised; recognized need to deploy smart dynamic countermeasures] | All of the above + reactive Intrusion Protection System (IPS) | Dynamic | Details to be provided… | Details to be provided… |
CYBERSECURITY FORUM and CyberSecurityForum.com are trademarks of PivotPoint Technology Corporation. All other product and service names mentioned are the trademarks of their respective companies.