From a multidimensional perspective, it is possible to view defense systems from two interesting points of view: one from an aspect of protecting the information and its secrecy (inside-out) while the second allows a comprehensive protective view in the context of the systems’ robustness and prevention of their disruption (top-down).
The person responsible for information security will place the item of information at the center of his world, and it is the asset that he will seek to protect, both in terms of privacy and in terms of protecting the “secret” that allows operational function and continuity to exist.
The person responsible for protecting the cyber space will seek to create matrix (length, width, and depth) defense systems at the enterprise and its infrastructures, beginning from the external physical access perimeter to the enterprise, through enterprise’s communications, computer, and control systems, and up to the information assets them self.
Cyber Defense Systems
Thinking of becoming a Cyber Specialist? Come and learn from our experts. For more