Protections
Types Of
Pillars
Users/ Actors
100

This includes desktops, laptops, servers, and other devices.  


Computer Systems

100

Focuses on securing the infrastructure that connects devices, including firewalls, intrusion detection systems, and network access control.

Network Security

100

This is how many pillars there are of cybersecurity

Four

100

A person who uses technology and computer systems responsibly, following guidelines and laws to ensure the safety and security of information.


Ethical User

200

This refers to the infrastructure that connects devices, including wired and wireless networks.

Networks

200

Focuses on securing software and applications from vulnerabilities and attacks, including secure coding practices and vulnerability testing.  

Application Security

200

Measures taken to stop cyber attacks before they occur, including training, software updates, and security protocols.

Cybersecurity Prevention

200

is anyone who attempts to access or use a system, network, or data without proper authorization or permission

Unauthorized User

300

This includes all types of information, whether stored on devices, networks, or in the cloud.

Data

300

Focuses on securing data, applications, and infrastructure in cloud  environments, including access controls, encryption, and data loss prevention.  

Cloud Security

300

The process of preparing and organizing strategies to protect computer systems and networks from cyber threats.

Cybersecurity Planning

300

An individual who intentionally uses technology to harm others, steal information, or disrupt computer systems.

Malicious User

400

This includes software programs and applications used on devices and networks.

Applications

400

Focuses on securing individual devices, such as laptops and desktops, from malware and other threats

Endpoint Security

400

The actions and tools used to safeguard computer systems and networks from unauthorized access and attacks.

Cybersecurity Protection

400

is an individual or process granted permission to access specific resources or systems, based on their role, responsibilities, and security clearance.

Authorized User

500

This includes protecting against financial losses from cyberattacks.  

Financial Assets

500

Focuses on securing Internet of Things devices, such as smart home devices and industrial equipment, from cyberattacks.

IoT Security

500

The practice of protecting personal and sensitive information from being accessed or misused by unauthorized users.

Cybersecurity Privacy

500

is an individual who finds and exploits vulnerabilities in systems or networks, often without explicit permission, but typically without malicious intent, potentially for the purpose of testing security or raising awareness.

Semi-authorized User

M
e
n
u