Page 48 - index
P. 48







In this flow chart, we can see that monitoring, prevention and incident response are something
that make cyber security and we can also notice how all of these elements are in correlation or,
in other words, how they make a cycle or a flow.

You will agree with us that is a very elegant way to describe a problem and to make some steps
forward in understanding its essence.

Some Words at the End

In this article, we make an attempt to provide a good graphical model of cyber security of today
and consequently make you easier to see only through one picture something that normally
needs to get described using many words. We hope this contribution is a good way to make a
cyber defense clearer to a very broad audience and represent a quite complex concept in a
pretty simple and “on the ground” manner. It’s not that easy to get familiar with a cyber security
of today, but, at least, we believe this representation was still a good approach.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Currently, she’s the
Editor-in-Chief of Australian Science Magazine, as well as an Online
Marketing Coordinator for Dejan SEO. She also serves as a Reviewer at
the Journal of Computer Sciences and Applications. She writes for
Australian and American security magazines. Milica is based in Subotica,
Serbia.



































48 Cyber Warnings E-Magazine – December 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   43   44   45   46   47   48   49   50   51   52   53