Skip to main content

Models & Methodologies

 

Process Methodology for Cybersecurity

A research methodology explains and discuss data or information collected that is used on the research is a key part for any thesis or presentation (Scribbr, 2019), therefore a Process Methodology is used to understand the previous process to accomplish tasks in Cybersecurity, will be shown on the chart below the series of steps to follow in a specific order. 



(Source: Softwaretestinghelp, 2023)



To have an effective manage of security there are six steps to follow, these should be follow for an specific team responsible for incidents. The followint steps are: 

  1.   Preparation: Important part that is responsible to provide valid information to the CSIRT (Computer Security Incident Response Team) this step is important because it help to figure out assets which become critical security attention for the team.
  2.   Detection: Second stage is more crucial than the first one because the team should be able to look for any breach or potential threat, once is detected the team must understand the nature and severity to document every action take and also understand the "when", "why" and "where" of the incident.
  3.   Containment: When the incident is detected by the CSIRT the team must isolate the case to there will not be any further damage, could be a single and easy step or could be hard depending on the situation and the target of the threat. 
  4.   Eradication: The fourth step is more complicated for the simple reason of finding the root of the problem to take severe, strong and immediately actions.
  5.   Recovery: The process of recovery and reinforce of the systems and resume of the production with extremely care, this stage involves critical thinking suitable for restoration.
  6. Post-incident follow-up: Last stage that must be completed within two weeks of the occurrence  to patch any gap that were not completed before and erradicated the incident.
(Source: https://www.softwaretestinghelp.com/what-is-incident-response-plan/#Incident_Response_Cycle)

Here we have a different perspective of the methodology.


(Source: Softwaretestinghelp, 2023) 


In conclusion,  the implementation of cybersecurity on a real scenario must follow the previous steps to ensure an effective managing of security, that can prevent hard attacks against compannies or universities regardless information that can be leaked, because facing a cyber attack it could be just the tip of the iceberg.


References: 

What is incident response plan - complete guide (2023) Software Testing Help. Available at: https://www.softwaretestinghelp.com/what-is-incident-response-plan/#Incident_Response_Cycle (Accessed: 03 June 2023).

What’s the difference between method and methodology? (no date) Scribbr. Available at: https://www.scribbr.co.uk/faqs/method-vs-methodology/ (Accessed: 03 June 2023).

 

Comments

Popular posts from this blog

Case Study

NNeuralink   The human brain is an incredible pattern-matching machine (Jeff Bezos), The founders of Neuralink are Elon Musk a well-known Executive Officer of Tesla Motors, and Max Hodak but this last one decide to leave the project in 2021. The principal aim of Neuralink is to create device that would be connected to the brains in order to help quadriplegic people to accomplish simple tasks that they were not able to do previously and of course this means a surgical procedure, this case study will talk about the aims of Neuralink and how can be so beneficial for our society in order to identify key themes and results.   The procedure is very complicated, and it needs the help of a precise equipment, the implant is inserted on a hole in the skull created by a robot and the implants are then embedded In the cortex, all the procedure can be done in 30 minutes, all of the procedure were never done on humans (livescience, 2023). Although the first Neuralink’s attempt to gain the a...

Initial Project Plan (Gantt Chart Update)

 Here is the information updated containing new topics and new dates based on my worktime. (Author's Work)