Cyber Security

Cyber Security

In today's interconnected world cyber security impacts everyone directly or indirectly. Achieving and maintaining superiority in cyberspace is a stated national strategy and a core part of the NSA/CSS and Cyber Command missions.

Cyber security encompasses more than information assurance, because it involves the full scope of cyber activities on a global scope within an integrated strategy.

Cyber security face several common challenges which influence both strategy and tactics in cyberspace.

Cyber Security

Landscape Discovery involves the continuous process of detecting and understanding the internetwork topology, the communications infrastructure, the services, and the users.

Dealing with Change in the cyber landscape as it evolves including (1) the evolution of user devices from desktops to laptops, to mobile devices including tablets and smart phones; and (2) the transition from distributed computing to cloud-computing data centers.

Controlling Access includes protecting the intranet, enabling extranet operations, and sharing information with partners and customers.

Achieving Scalability includes implementing security across a large enterprise, supporting required user services, and maintaining cost-effective operations.

Today's Cyber Security topic includes concepts, technology, and processes that have evolved or are related to Computer Security (COMSEC), Information Security (INFOSEC), Information Assurance, Computer Network Defense (CND), and Defensive Cyber Operations (DCO).

This topic provides a summary of concepts in Cyber Security, including strategies, activities, and functional taxonomies.

The discussions in this topic are intended to provide an initial overview for any interested reader, not just a technical professional. It is designed as a quick read for a decision-maker or other interested reader anyone who needs an quick understanding of the topic at a high level or for a decision-maker who needs to get up-to-speed.

Continue to Cyberspace.