"/>

PAe - surface Environment of exposure (THAT), new environment of the NCC
accesskey _ mod _ content

Surface environment of exposure (THAT), new environment of the NCC

20th may 2020

This neural network provides a layer of access to the rest of content and resources of the NCC, as solutions, developments, guides, etc. Its main objective is to improve the capacities in monitoring and reducing the size of exposure of systems to deal with threats of cyberspace, in real time.

The National Cryptologic centre (Opens in new window) (CCN) has created Surface environment exhibition “ S ” (Opens in new window) (THIS), a new environment designed to improve monitoring and reducing the size of exposure of systems to deal with threats of cyberspace, in real time.

THIS, that is in constant process of environmental adaptation and continuous improvement, is the integration of solutions aimed at the analysis of the status of the security of entities and its evolution, through the verification, Audit and management of the implementation of security. this way, it is possible to reduce the levels of exposure to those information systems, to predict the potential attack and to anticipate the realization of the threats.

This neural network provides a layer of access to all resources, solutions, developments, guides, news, training courses, culture of cybersecurity, etc. dedicated to effective responses, to protect effectively the systems, opposite the steady increase in number, sophistication and complexity of the cyber attacks.

In particular, THIS raises the following objectives:

  • To ascertain and monitor the area of exposure of systems using risk analysis and study of Systems.
  • Establish procedures for the Continuous Improvement through verification and auditing of the ongoing Implementation of The security council.
  • Facilitate and accelerate the process of implementation of systems through the study of simplified security.
  • Manage the security of in real time.
  • Reducing the turnaround time for continuous monitoring by applying to the use of interactive dashboards.
  • Educate the user of technology in procedures and Good practices through training, information, technical guides, etc. to create a culture of cybersecurity.

Original source of news (Opens in new window)

  • Security