Application of the architectures and cyber intelligence

Now that we have a model, where do we even begin? 

Here's an example:

  1. Understand your organization's business goals.
  2. Identify the people, processes, products, and partners that are critical to meeting those goals:
    • Executive stakeholders
    • Single points of failure
    • Reputation
    • Manufacturing equipment and systems
    • Intellectual property
    • Core systems: databases, servers, networking devices
  1. Identify the people, processes, products, and partners that support in meeting those goals:
    • Human resources
    • IT helpdesk
    • Program/project management office
    • Remote offices
  2. Prioritize between critical and support.
  3. Move forward in the prioritized implementation of establishing the means to communicate, collaborate, and execute actions based cyber intelligence to applicable parties:
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.190.182