Understand the protection surface - Deepstash

Understand the protection surface

It's normal to start risk assessment with attack surface analysis. For example, security professionals look at where the perimeter is, how someone might break in and what method they might use.

With Zero Trust, it is different. The highest value and highest risk users and assets are recommended starting from the data and applications. Consequently, the protective surface is smaller than the attack perimeter and easier to defend.

Prioritise what to protect based on what's critical, then move to the next set of protection surfaces on the priority list.

15

68 reads

CURATED FROM

IDEAS CURATED BY

catherinma

Land/geomatics surveyor

With cybersecurity, the question is no longer only how to keep bad players out. Instead, the priority is how to recover as quickly as possible once an attack occurs.

The idea is part of this collection:

Metaverse

Learn more about cybersecurity with this collection

Find out the challenges it poses

Learn about the potential impact on society

Understanding the concept of Metaverse

Related collections

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates