Page 47 - index
P. 47







These days a cyber security is facing up a new stage in its development. A modern cyber
defense can be seen as a mix of monitoring, prevention and incident response. The accent of
current cyber systems is still on a monitoring and mainly on a prevention, while an incident
response appears as a field that needs a lot of effort and time invested in to get developed to
full.

Let us try to explain why a monitoring and prevention are so important in modern security and
how a progress of the incident response procedures could benefit this area.

Firstly, a monitoring is about tracking a situation in cyberspace and getting the information how
the things inside a cyber system are linked to each other. It is a quite passive factor in cyber
security, because it includes only an observation with a minimum action applied.

On the other hand, a prevention is a process of invoking measures and techniques that can help
us avoid some undesirable conditions in the future. For instance, if we install an anti-malware
software to our computer, we can avoid specific sorts of malware to infect our machine. In other
words, it is a combination of passive and active principles in cyber defense.

Finally, we came to an incident response. It’s a completely active factor in cyber security and
covers a set of measures, techniques and procedures that are created to support a system that
is under attack.

Further, we will talk about an actual cyber defense model that can assist us in having a better
and more comprehensive insight into the situation within an IT infrastructure.

Ways to Understand the Issue

The best way to understand the problem is to make a good - either graphical or mathematical
representation of the issue. You would agree with us that math seems as too complex to many,
but a good drawing of your model can make things very simple and approachable to everyone.

For such a reason, in Figure 1 we offer this simple and clear model of cyber security that can
explain all we mentioned through this article and help us to have a better insight and an efficient
observation of this area.




















Figure 1. A cyber security flow chart

47 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   42   43   44   45   46   47   48   49   50   51   52