Jay C. "Jazzy J" Theriot
  • Home
  • Weather
  • NMD Info
  • Security Eval Process

RSS Slashdot

  • Bitcoin, Other Cryptocurrencies Plummet This Weekend April 19, 2021 EditorDavid
  • Edward Snowden's NFT Self-Portrait Sells for $5.4 Million in Charity Auction April 19, 2021 EditorDavid
  • What Happened After Elite Universities Made Standardized Test Scores Optional? April 18, 2021 EditorDavid
  • Proposing an Alternative To Renting or Owning a House: Publicly-Owned Housing April 18, 2021 EditorDavid
  • How a True-Crime Podcast Led to an Arrest in a 25-Year-Old Cold Case April 18, 2021 EditorDavid

Recent Posts

  • Preservation of the Union November 7, 2020
  • A Deplorable Debate: A Sign of the Death of Democracy? October 1, 2020
  • Gosh Darn Independent (GDI – La, US) September 20, 2020
  • US Loyalists: Where Are You? September 15, 2020
  • Servers and Services are on the way. August 20, 2020

Security Eval Process

The basis for my thoughts about information security lies in a 5-step process I learned years ago:

  1. Identification of Threat
  2. Identification of Vulnerabilities
  3. Counter-measure development
  4. Counter-measure implementation
  5. Assessment of counter-measure’s effectiveness.

When you get to step 5, you loop and do it again, always staying on alert.

1.  Identification of Threat:  This is where you ask what is out there.  You want to know what the bad guys are trying to do.   For example, it is a commonly held principle that certain operating systems are more targeted than others.  In this area, you are not concerned with “oh I use this system, so I’m ok?”  Here, you are asking simply, what are they (the bad guys) doing?

2.  Identification of Vulnerabilities:  All systems are vulnerable.  Here, security holes are matched up with threats.  If there is a match, then a counter-measure needs to be developed.  No match, no problem.

3.  Development of counter-measures:  CM development can be the most challenging stage for some people.  A realistic and implementable plan needs to be developed that addresses the identified threat/vulnerability combination.

4.  Implementation of counter-measures.  Once the CMs are mapped out, put them in place.

5.  Assessment of CM effectiveness.  Did the actions do what they were intended to do?

Then the process is started again.

 

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Posts

Preservation of the Union

On December 16, 2016, I went to work as normal.  It was the last day in my life that was normal. After an excruciating month, I woke up on January […]

More Info

A Deplorable Debate: A Sign of the Death of Democracy?

Bipartisan condemnation rang out around the world at the behavior of the incumbent and the presidential candidate. Who won is uncertain. Who lost, is certain. Those loving democracy and the […]

More Info

Gosh Darn Independent (GDI – La, US)

I will be happy with bipartisanship reappears. This country is by the people, for the people. At least the last couple of administrations have been targeting one group.   We […]

More Info

US Loyalists: Where Are You?

Trump loyalist. Biden loyalist. Democrat. Republican. Conservative. Liberal. Antifa. Qanon. BLM. White Nationalist. Labels. Words. Where are those loyal to the US? In 1987, I signed the dotted [...]

More Info
Some of my other sites
Global Weather Tracking and Analysis

Archives

RSS Slashdot

  • Bitcoin, Other Cryptocurrencies Plummet This Weekend April 19, 2021
  • Edward Snowden's NFT Self-Portrait Sells for $5.4 Million in Charity Auction April 19, 2021
  • What Happened After Elite Universities Made Standardized Test Scores Optional? April 18, 2021
  • Proposing an Alternative To Renting or Owning a House: Publicly-Owned Housing April 18, 2021
  • How a True-Crime Podcast Led to an Arrest in a 25-Year-Old Cold Case April 18, 2021

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Powered by WordPress | theme Layout Builder