LISTCRIME.COM
LISTCRIME.COM

The Technology, Process and People utilized to protect Internet Protocol Resources    

A Holistic view to approaching Cyber Security and Cyber Crime    


The Cyber Ecosystem of Internet Protocol Resources attempts to provide a more holistic and unified view to our approach to cybercrime and cybersecurity. The map below attempts to highlight a variety of different levels of people, processes, technology and physical services that make up our cyber ecosystem, so that we can start to view the internet and its borderless security problems more broadly.

THE COUNTERMEASURES OF INTERNET PROTOCOL RESOURCES, LAYER 9A

The Countermeasures of Internet Protocol Resources, Layer 9A

The Countermeasures used to secure Internet Protocol Resources are described as (Source NIST) protective measures prescribed to meet the security objectives (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management controls, personnel security, and security of physical structures, areas, and devices. 1. Technology - Security Products 2. People - Security Services 3. Process – Security compliance, regulation, and requirements. See: Nonprofit Cyber is a coalition of implementation-focused cybersecurity nonprofits to collaborate, work together on projects, voluntarily align activities to minimize duplication and increase mutual support, and link the community to key stakeholders with a shared communication channel.
The Solutions Index can be found here: nonprofit-cyber-solutions-index/.

Another great resource is the Strategy of Security which analyzes the business and strategy of cybersecurity. They attempt to Map the Cybersecurity Ecosystem with a table of contents to help you navigate through its mapping. This content aligns with the Countermeasures of Internet Protocol Resources, Layer 9.

THE CYBER ECOSYSTEM MAP