{"id":289,"date":"2023-02-02T18:39:44","date_gmt":"2023-02-02T18:39:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/?p=289"},"modified":"2023-02-02T18:39:44","modified_gmt":"2023-02-02T18:39:44","slug":"what-is-cybery-defense","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/2023\/02\/02\/what-is-cybery-defense\/","title":{"rendered":"What is CYBERY DEFENSE?"},"content":{"rendered":"\n<p>As cyber attacks continue to rise in size, frequency, and complexity, cyber defense is one of the most integral and difficult pieces of any organization\u2019s\u00a0<a href=\"https:\/\/www.ironnet.com\/steps-for-developing-a-holistic-cybersecurity-strategy\">cybersecurity strategy<\/a>. Cyber defense is a coordinated act of resistance that guards information, systems, and networks from cyber attacks by implementing protective procedures such as firewalls,\u00a0<a href=\"https:\/\/www.ironnet.com\/what-is-network-detection-and-response\">network detection and response<\/a>\u00a0(NDR), endpoint detection and response (EDR) to identify, analyze, and report incidents that occur within a network. Still, cyber defense teams are faced with a near impossible task of securing all an organization\u2019s vulnerabilities, and a big part of that means being able to deeply understand the tactics, capabilities, and motives of attackers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-content\/uploads\/sites\/32444\/2023\/02\/security-1050x1050-web-adobestock-434719822-1.jpeg\" alt=\"\" class=\"wp-image-290\" width=\"788\" height=\"788\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>As cyber attacks continue to rise in size, frequency, and complexity, cyber defense is one of the most integral and difficult pieces of any organization\u2019s\u00a0cybersecurity strategy. Cyber defense is a coordinated act of resistance that guards information, systems, and networks from cyber attacks by implementing protective procedures such as firewalls,\u00a0network detection and response\u00a0(NDR), endpoint detection&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/muradi-firoz\/2023\/02\/02\/what-is-cybery-defense\/\">Read More<\/a><\/div>\n","protected":false},"author":26138,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/users\/26138"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/posts\/289\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/muradi-firoz\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}