0% found this document useful (0 votes)
105 views6 pages

Security Operations: Secure File Exchange/ Storage Deception

This document provides an overview of cybersecurity categories and subcategories. It shows cybersecurity organized into broad categories such as infrastructure, perimeter security, endpoint security, data security, and identity and access management. Under each category it lists related subcategories such as firewalls, IDS/IPS, encryption, email security, and more.

Uploaded by

Yosia Suherman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views6 pages

Security Operations: Secure File Exchange/ Storage Deception

This document provides an overview of cybersecurity categories and subcategories. It shows cybersecurity organized into broad categories such as infrastructure, perimeter security, endpoint security, data security, and identity and access management. Under each category it lists related subcategories such as firewalls, IDS/IPS, encryption, email security, and more.

Uploaded by

Yosia Suherman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Secure File Exchange/ Firewall &

Deception Fraud Prevention IPS/IDS/NGIPS Unified Threat Management Voice Sec.


Storage Outbound
Secure Config/Hardening
Web Security Gateway Anti-Virus/Malware
Cloud/Vendor Security
CA/PKI WAF NAC Endpoint Sec. Suites
DLP
Hardware/Embedded
DDoS
Secure Access
IoT/SCADA/ICS

Infrastructure Mainframe/Midrange

Email Mobile Sec. Suites


Perimeter
Monitoring Multi-Factor Auth.

Network Endpoint Password/Privilege/Identity Management


Cyber Insurance
Security
Incident Response Application Sec.
Operations
Sec. Analytics Data Compliance Frameworks
Governance
Backup/Recovery
Threat Intelligence
Force Forensics
Multipliers
Bounty Support
Encryption
Brand/Reputation Protection
Comprehensive DR/BC Vulnerability Mgt.

Penetration Testing Data Destruction

SIEM Identity/Access Management


GRC Suite
File Integrity Monitoring
Insider Threat Content/Intellectual Property
Protection
Breach and Attack
Simulation
Value Added Resellers
Sec. Industry Analysis

Research & Development


Managed Security Services

Recruiting/Internships/ Consulting/ Information Assurance/ Complexity Reduction


Succession Planning Professional Training / Conferences Risk Management
Services
Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Network

Protocol
Secure File Containers
Exchange/Storage Encryption/DRM Virtualization
Cloud/Vendor
Cloud/ Security
Intermediary Compliance

Internal 3rd Party/VPC


CASB
Monitoring External

AI/Correlated/Analytics
Virtual/SDN
Volumetric
Layer 3
Endpoint

Net2Net DDoS Layer 7


Secure Access
Application Cloud/API

Integration/Automation Hardware (NAC)


HoneyPots
Deception Protocol (DNS, OSPF,BGP)
HoneyNets
Infrastructure
Packet Broker
HoneyCredentials
Cloud Virtual / SDN / Micro-segmentation

Filtering
Internal
DMARC
Email Automatic
Cloud/aaS CA/PKI
Provisioning Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

Infrastructure Protection At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

External ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Perimeter
Layer 3
Layer 7 Signature
Firewall
Virtual/SDN/Cloud IPS/IDS/NGIPS Behavior

Endpoint Deception

Web Security Enterprise Anti-fraud


Gateway
Cloud Fraud
Integrated
Prevention
Analytics

Enterprise
NAC Cloud/Virtual
Mobile
Enterprise
Unified Threat
Management
Cloud

Basic Keywords
Content Discovery/
DLP
Tagging
Cloud/Virtual/CASB
Application
API/In App
WAF Appliance

Cloud/Virtual

Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Endpoint
Mobile
Baseline Scans/
Voice Sec. Application Manual Remediation
Secure Config/
Infrastructure Hardening
Continuous Hardening/
Automatic Remediation

Signature
Anti-Virus/ Legacy Device
Behavior
Malware Security
Mainframe/
Dynamic Midrange
Security Suites

Traditional Device Security


Endpoint Sec.
Mobile Mobile Sec.
Suites App/Data Security
Suites
Cloud/ Communications
Virtual Security

Trusted
Hardware/ Execution Architecture
Embedded IoT/SCADA/ICS
(Hardware and Trusted (Data Acquisition, SD-LAN (Wired &
Execution Platform Processing, Transmitting, Wireless)
Environment) IoT/Embedded and Storage)
Integration
Devices

Password
Management
Factors
Multi-Factor Password/Privilege/Identity Privilege
Auth. Management Management
Integration/
Federation Identity Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

Management At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Data
Enterprise Internal Intl./Federal/State
Frameworks
Forensics External/Cloud Compliance
Application Sec. Mobile Industry Frameworks
Proactive Frameworks
Cloud/aaS Reactive Consultants/Assessors/
Registrars

Retention/ At-Rest
Data Destruction/Discovery In-Motion
Destruction Encryption
Voice/Video/RTSP
External Providers
Cloud

Identity Management
Enterprise Change Logging
Access Management
Vulnerability Cloud/aaS File Integrity Change Auditing
Mgt. Monitoring Identity/Access
Integration - Endpoint Federated Identity
Management
Vuln./Patch Detection & Privileged Identity
Management Response Management/Governance

DRM
Content/Intellectual
Property Protection
Protection
Providers

Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno
Governance Traditional
(post-event)
Response (non-
Passive Advanced Analysis
integrated)
(predictive)
Threat Intelligence Active Incident Workflow Support Sec.
Response Analytics AI / Cognitive
Integrated Integrated Response and
Workflow (SOAR)
Connectors/
Threat Hunting Integrations
User Behavior
Analytics
Brand/IP
Monitoring Insurance
Brand/Reputation Cyber
Protection Domain Insurance Cyber Risk
Management Transfer

Compliance
Breach and People Attacks Standard
GRC Automation/ Attack Technology Attacks
Suite WorkFlow Simulation Virtual/Cloud
Process/Procedure
Cloud Hosted Connectors/
Attacks
SIEM Integrations
Analytics
Intelligence
Exchange
External Workflow
Support
Ethical Hacking Detection
Penetration Insider (Analytics)
Testing Threat
Automated Tools Prevention

Disclosure

Bounty Support
Reimbursement Licen se - This wor k is licen sed under Crea tive Comm ons Attr ib ution-Share Alike 4.0 htt ps:/ /creativecommons .or g/licenses/by-s a/4.0/

At tr ibution — You mus t give appropr iate credit, pro vide a link to t helicens e, and indicate if changes were made . You may do s o in an y r easonable manner ,
but n ot in any way that sugges ts t he licens or end ors es you or your use .

ShareA like — If you rem ix, tr ansf orm, or b uild u pon the mat erial, you mus t dis tribut e your contr ibutions under t he same license as the or iginal .

No addition alr est riction s — You may not apply legal term s or t ech nological meas ures that legally r est rict oth ers f rom doing anyth in gt he licens e permit s.
Copyr ight 2018 Jos hua C G eno

You might also like