CYBERSECURITY PROCESS

4D-R2 Philosophy / D.1 DETECT

D.1
Detect (you are here)
Internal/External threats and vulnerabilities.
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
Detect

Internal/External threats and vulnerabilities.

Defend

Organization’s personnel, information, intellectual property, and assets.

Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

Destroy

Internal/External Threat(s).

Regroup

IT/Cyber personnel, Management, C-Suite.

Reforge

Organization’s policies, security training, and infrastructure.

Internal & External

Perform

Vulnerability Scanning
Baselining
Security Information and Event Management (SIEM) & Analytics
Threat Hunting
Code Analysis

Research

Global Incidents
Industry Feeds
Vendor Forums

Organizations & Offices

Setup

Deception / Honeypots
Network Intrusion Detection System (NIDS)
Host Intrusion Detection System (HIDS)
Wireless Intrusion Detection System (WIDS)
Intrusion Detection / Prevention System (IDS/IPS)
Antimalware