Meeting a pending security threat.Handling a security event in progress the aftermath of a security breach
Employing the SecuritySPmapping methodology one would build the universal template of actions that will express, display and lay out any and all security efforts. The template will serve as a guide and a check-list to insure that all aspects of the security campaign are being properly addressed.
These Interactive Pages Allow Readers to Add their Contribution to the next edition of The Unending CyberWar
book by Dr. Gideon Samid. This book fast becomes the standard security handbook, a "Must Read for Many Years to Come" as Ms. Avivah Litan, VP Gartner finds it.
The template begins with the generic security challenge, and projects to its abstraction, extension, and breakdown
The three identified components cover every security activity, and they are: