{"id":65,"date":"2014-04-28T09:42:04","date_gmt":"2014-04-28T15:42:04","guid":{"rendered":"http:\/\/jayctheriot.com\/bbs\/?page_id=65"},"modified":"2014-04-28T09:42:04","modified_gmt":"2014-04-28T15:42:04","slug":"electronic-communication-security-principles","status":"publish","type":"page","link":"https:\/\/jayscafe.net\/?page_id=65","title":{"rendered":"Security Eval Process"},"content":{"rendered":"<p>The basis for my thoughts about information security lies in a 5-step process I learned years ago:<\/p>\n<ol>\n<li>Identification of Threat<\/li>\n<li>Identification of Vulnerabilities<\/li>\n<li>Counter-measure development<\/li>\n<li>Counter-measure implementation<\/li>\n<li>Assessment of counter-measure&#8217;s effectiveness.<\/li>\n<\/ol>\n<p>When you get to step 5, you loop and do it again, always staying on alert.<\/p>\n<p>1. \u00a0Identification of Threat: \u00a0This is where you ask what is out there. \u00a0You want to know what the bad guys are trying to do. \u00a0 For example, it is a commonly held principle that certain operating systems are more targeted than others. \u00a0In this area, you are not concerned with &#8220;oh I use this system, so I&#8217;m ok?&#8221; \u00a0Here, you are asking simply, what are they (the bad guys) doing?<\/p>\n<p>2. \u00a0Identification of Vulnerabilities: \u00a0All systems are vulnerable. \u00a0Here, security holes are matched up with threats. \u00a0If there is a match, then a counter-measure needs to be developed. \u00a0No match, no problem.<\/p>\n<p>3. \u00a0Development of counter-measures: \u00a0CM development can be the most challenging stage for some people. \u00a0A realistic and implementable plan needs to be developed that addresses the identified threat\/vulnerability combination.<\/p>\n<p>4. \u00a0Implementation of counter-measures. \u00a0Once the CMs are mapped out, put them in place.<\/p>\n<p>5. \u00a0Assessment of CM effectiveness. \u00a0Did the actions do what they were intended to do?<\/p>\n<p>Then the process is started again.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The basis for my thoughts about information security lies in a 5-step process I learned years ago: Identification of Threat Identification of Vulnerabilities Counter-measure development Counter-measure implementation Assessment of counter-measure&#8217;s effectiveness. When you get to step 5, you loop and do it again, always staying on alert. 1. \u00a0Identification of Threat: \u00a0This is where you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-65","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/jayscafe.net\/index.php?rest_route=\/wp\/v2\/pages\/65","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jayscafe.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jayscafe.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jayscafe.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jayscafe.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=65"}],"version-history":[{"count":0,"href":"https:\/\/jayscafe.net\/index.php?rest_route=\/wp\/v2\/pages\/65\/revisions"}],"wp:attachment":[{"href":"https:\/\/jayscafe.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}