Overview
How to Be a Cybersecurity Analyst
Assess the threat
Determine the risk level
Select controls
System Security: strip it down to the minimum requirements; configure what’s left over (whitelist: specify what is allowed); patch what you can’t fix; add armor/weapons (methods to block, absorb, parlay); monitor & hunt the bad stuff.
Monitor their effectiveness
Respond and reduce impact
Last updated
Was this helpful?