CYBERSECURITY PROCESS

4D-R2 Philosophy / D.1 DETECT

D.1
Detect (you are here)
Internal/External threats and vulnerabilities.
Organization’s personnel, information, intellectual property, and assets.
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
Internal/External Threat(s).
IT/Cyber personnel,
Management, C-Suite.
Organization’s policies, security training, and infrastructure.
01
Detect

Internal/External threats and vulnerabilities.

02
Defend

Organization’s personnel, information, intellectual property, and assets.

03
Disseminate

Detailed information of an incident to authorized personnel to obtain further instructions to potentially 

04
Destroy

Internal/External Threat(s).

05
Regroup

IT/Cyber personnel, Management, C-Suite.

06
Reforge

Organization’s policies, security training, and infrastructure.

Internal & External

Perform

Vulnerability Scanning
Baselining
Security Information and Event Management (SIEM) & Analytics
Threat Hunting
Code Analysis

Research

Global Incidents
Industry Feeds
Vendor Forums

Organizations & Offices

Setup

Deception / Honeypots
Network Intrusion Detection System (NIDS)
Host Intrusion Detection System (HIDS)
Wireless Intrusion Detection System (WIDS)
Intrusion Detection / Prevention System (IDS/IPS)
Antimalware