A Complete IT Security Approach Summarised In Nine Pictures

A Complete IT Security Approach Summarised In Nine Pictures


IT security requires consistent, developed approaches to identify and eliminate threats. This nine-step summary identifies the key stages you need to keep in mind.

This approach was developed by Cisco security subdivision Cisco, but it’s a methodology that will work regardless of the specific technology choices you make. It’s further divided into three areas: measures to implement before an attack, steps to take during an attack, and tasks to perform after an attack.

Pre-attack: Discover


Magnifying glass picture from Shutterstock

Pre-attack: Enforce


Riot picture from Shutterstock

Pre-attack: Harden


Bootcamp picture from Shutterstock

During attack: Detect


Scientist picture from Shutterstock

During attack: Block


Road block picture from Shutterstock

During attack: Defend


Soccer picture from Shutterstock

After attack: Scope


Scope picture from Shutterstock

After attack: Contain


picture from Shutterstock

After attack: Remediate


Doctor picture from Shutterstock

Log in to comment on this story!