Cybersec Base #003: Pillars of Cybersecurity|People, Process, Technology

I never imagined chemistry would come in handy in cybersecurity until I came up with the acronym "Cyber PPT". I remembered using pipette during my chemistry practical days, to transfer liquids and constantly referring to it as "PPT." It was a minor recollection, but it gave rise to a wonderful concept. If someone ever questioned me if I had used chemistry in cybersecurity, I would say emphatically, "YES," and I know you would be my witnesses.
In this post, we will talk about the 3 pillars of cybersecurity.
Follow along!!!
1.1 Pillars of Cybersecurity(Cyber PPT)
People, process, and technology are all required for effective Cybersecurity. Each of these components/pillars is essential in defending systems and data from cyber threats.
Simply use the acronym Cyber PPT to help you recall. We will go over each of them briefly.
Pillar 1: People
Humans are frequently regarded as the weakest link in cybersecurity. This is due to the fact that human error, such as falling for phishing schemes or using weak passwords, can expose systems to cyberattacks.
People/human are also the strongest link because they are the greatest defense in the realm of cybersecurity; they establish and implement security policies, monitor systems for threats, and respond to security problems (Meaning you cant do without people in Cybersecurity)
The majority of people who disregard security protocol are not doing so deliberately; rather, they lack the necessary training or understanding of the importance of their actions. Effective training, education and test can assist reduce the risk of human error and improve an organization's overall security posture.
Employee testing following cybersecurity training is a vital aspect of ensuring that employees have the necessary knowledge and abilities to secure the organization's systems and data from cyber threats. Knowledge assessments, phishing simulators, scenario-based exercises, role-playing exercises, and continuous monitoring are examples of varied testing methods(WHICH OF THESE HAVE YOU TRIED?)
Pillar 2: Process
An organization's response to security threats and incidents is governed by the policies, procedures, and guidelines that make up its cybersecurity processes. Good processes guarantee that security is a top concern at all organizational levels and that there are precise instructions for how to handle security events. Organizations may identify areas for improvement and make sure their cybersecurity processes are current and efficient by conducting regular security audits and risk assessments.
ARE CYBERSECURITY PROCESSES DOCUMENTED?
OF COURSE THEY ARE!!!
WHY?
Documenting cybersecurity processes is important because it ensures that everyone involved in protecting the organization's systems and data is on the same page and following uniform procedures. Also, it makes it simpler to find and fix any security posture gaps or weaknesses within the firm.
To make sure that cybersecurity processes are effective and current with the most recent threats and security best practices, it is crucial to continuously examine and update them in addition to documenting them. The organization's security posture may be maintained over time by using this continual evaluation process to spot areas that need improvement.
(Don't worry, we'll go into cybersecurity policies in greater detail in a later post. REMAIN SUBSCRIBED!)
Pillar 3: Technology
Technology is a crucial element of cybersecurity because it offers the infrastructure and capabilities required to defend systems and data from online threats. This is where logical security comes into play. Variety of techniques and technology are used to assist protect against, identify, and react to recognized threats.
Firewalls, intrusion detection systems, encryption, and other security tools fall under this category. But, cybersecurity cannot be ensured just by technology. To guarantee that it is used successfully and that security policy are correctly applied, technology must be reinforced by people and processes.
Ultimately, for good cybersecurity, the interaction between people, process, and technology is essential. To build a solid security posture that shields systems and data from cyber threats, all three components must cooperate.
"Human error is the biggest security vulnerability."
David Kim
1.2 Review Questions
Which of the cybersecurity pillars does Wireshark belong to?
Which of the cybersecurity pillars does password management policy belong?
Research: _________ under the U.S. Commerce Department has developed the Cybersecurity Framework for private-sector companies to use as a guide in creating their own best practices





