In: Computer Science
Clearly in an environment of the internet of things and the fog of the internet, traditional firewalls and traditional cyber security methodology is insufficient to protect critical infrastructure and industry from cyber-attacks. In a substantive post (at least 250 words or greater) Develop your model of what a successful cyber defense should be, and substantiate your argument.
Answer:-
Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cyber security and physical security.
Ensuring cyber security requires coordinated efforts throughout an information system. Elements of cyber security include:
One of the most problematic elements of cyber security is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defence Department organisations), describes the problem:
"The threat is advancing quicker than we can keep up with it.
The threat changes faster than our idea of the risk. It's no longer
possible to write a large white paper about the risk to a
particular system. You would be rewriting the white paper
constantly..."
To deal with the current environment, advisory organisations are
promoting a more proactive and adaptive approach. The National
Institute of Standards and Technology (NIST), for example, recently
issued updated guidelines in its risk assessment framework that
recommended a shift toward continuous monitoring and real-time
assessments.