Saturday, June 22, 2013

4 step model to effective security program

Can automated security put agencies a step ahead of the hackers? -- GCN: "Hanna recently described a four-step model for an effective security program:
  • Prepare, which includes risk analysis and development of policies, controls and training.
  • Detect, which includes monitoring configuration, detecting intrusion and anomalies and sharing threat information.
  • Analyze, which includes incident management, correlation and human analysis.
  • Respond, which includes containment, evidence gathering, recovery, forensics and prevention. . . ." (read more at link above)

more news below





No comments:

Cybersecurity - Google News

Malware - Google News

National Security - Google News

"Security Threats" - Google News

Maritime security - Google News

The State of Security

TSA - Google News

Homeland Security - Google News