“Protecting the confidentiality, integrity, and availability of information systems of an organization through proactive design and configuration, ongoing monitoring of system state, detection of unintended actions or undesirable state, and minimizing damage from unwanted effects”.
Cyber Security Operations
