CyberSecC@ptBlackb3ard
  • 🦜Welcome
  • Cyber Security
    • Offensive Security
      • Penetration Testing Methodology
      • Pre-Engagement Interaction
      • Reconnaissance (Information Gathering)
        • Open-Source Intelligence (OSINT)
      • Scanning and Enumeration
        • Domain Enumeration
        • Network Enumeration
          • Network Mapper (nmap)
          • Port/Protocol & Service Enumeration & Attack
            • File Transfer Protocol (FTP): 20, 21
              • Trivial File Transfer Protocol (TFTP): 69
              • FTP over SSL/TLS (FTPS): 989, 990
            • Secure Shell (SSH): 22
            • Telnet: 23
            • Simple Mail Transfer Protocol (SMTP): 25
              • SMTP Secure (SMTPS): 587
            • Domain Name System (DNS):53
            • Dynamic Host Configuration Protocol (DHCP): 67, 68
            • Hyper Text Transfer Protocol (HTTP): 80
              • HTTP over SSL/TLS (HTTPS): 443
            • Kerberos: 88
            • Post Office Protocol version 3 (POP3): 110
            • Network Time Protocol (NTP): 123
            • Remote Procedure Call (RPC): 135
            • NetBIOS: 137, 138, 139
            • Internet Message Access Protocol (IMAP): 143
            • IMAP over SSL/TLS: 933
            • Internet Relay Chat (IRC): 194
            • Light Weight Directory Access Protocol (LDAP): 389
              • LDAP over SSL/TLS (LDAPS): 636
            • Server Message Block (SMB): 445
              • Hostname
              • Shared Folders
            • Network File System (NFS): 2049
            • Microsoft SQL Server: 1433
            • MySQL Server: 3306
            • PostgreSQL Server: 5432
            • Remote Desktop Protocol (RDP): 3389
            • Border Gateway Protocol (BGP): 179
            • Remote Authentication Dial-In User Service (RADIUS): 1812, 1813
        • Web Enumeration
      • Security Assessment Report Writing
      • Tools
        • Cryptography & Encoding
          • Password Recovery
        • Network Tools
  • Networking
    • OSI and TCP/IP Model
      • Common Network Ports & Protocols
  • Cloud
    • Cloud Computing
  • General
    • Cyber Security Theory
      • Information Security
      • Cybersecurity Resilience
      • Cybersecurity Posture
    • Terms and Acronyms
    • Database Cheat Sheets
Powered by GitBook
On this page
  1. General
  2. Cyber Security Theory

Cybersecurity Posture

Cybersecurity posture refers to an organization's overall security readiness and defensive capabilities against cyber threats.

Cybersecurity encompasses information security, cybersecurity resilience, and risk management, but each focuses on distinct aspects of this readiness.

  • Information Security focuses on protecting data, systems, and networks by ensuring their CIA triad.

  • Cybersecurity Resilience ensures an organization can withstand, recover from, and adapt to adverse cyber events while continuing operations.

  • Cybersecurity Posture measures the overall strength (holistic) of an organization's cybersecurity defenses, including its people, processes, and technologies.

Information Security forms the foundational layer, consisting of security measures (access controls, firewalls, etc.) that directly contribute to a robust cybersecurity posture but do not guarantee resilience if these controls fail. Imagine walls, gates, and guards protecting a castle, protecting its inhabitants and valuables inside, and only letting authorized persons in.

Cyber Resilience enhances cybersecurity posture by adding adaptability and survivability. Even if the prevention measures fail, resilience ensures the organization can recover quickly, reducing downtime and mitigating damage. Imagine creating emergency plans, stocking up supplies, and repair crews that ensure the castle remains functional during or after an attack.

Cybersecurity Posture represents the overall evaluation of both information security and cybersecurity resilience. It includes preventive controls (information security), reactive and adaptive measures (cybersecurity resilience), and strategic elements like incident response, threat intelligence, governance, and risk assessment. It refers to the overall state of the castle - defenses, emergency preparedness, training of guards, & ability to withstand prolonged sieges.

PreviousCybersecurity ResilienceNextTerms and Acronyms

Last updated 5 months ago