User Tools

Site Tools


critical_armor

Program

“Do you think you can teach this to our church?”

That question, asked by Pastor Chuck Shorter over his dinner table created the original Critical Armor Program. We had been discussing my work in secular cybersecurity and how I applied it to the technology in the home to protect my family from wickedness. His question stopped me. I didn't know if I could successfully train what I did almost by reflex after twenty-five years in information technology, network design, and cybersecurity compliance.

But I promised to pray about it.

A few months later, I called back with the Zone Strategy built out of four individual zones. I felt that I might be able to help. The first run-through of the material took seven one-hour sessions and, frankly, over-complicated the basics. After a dozen opportunities to preach conferences, it had been edited down to four sessions, but still somewhat complex.

This new Program version simplifies to a minimum of four sessions with three zones: Personal, Perimeter, and Pathway. One extra section provides training to overcome temptation called Practice, which would be presented in a fifth session.

The sessions use QR codes linked to this wiki for instant access to more information. The wiki will aggregate the documents, presentations, and any lock-down scripts and procedures I create and use.

Please note: I am not affiliated with any of the companies or products listed on these pages. This information is free for you to use in any way you find it helpful. I feel as though I might become biased if I made any profit from the sale of these recommendations, therefore I decided against it.

For Reference: Cybersecurity Background

Elements

Generally, most will find what they're looking for in the Personal Zone (#3). If you understand defense-in-depth and security control types already, feel free to skip directly to it.

Definitions

Four Risk Mitigation Methods:

  1. Tolerate - “Ignore it”
  2. Terminate - “Remove it”
  3. Transfer - “Insure it”
  4. Treat - “Fix it”

Three Types of Controls:

  1. Preventative: “Lock the Door”
  2. Detective: “Alarm the Door”
  3. Corrective: “Fix the Door”

Defense-in-Depth:

A security strategy in which multiple tools, mechanisms, and policies are deployed together on the assumption that if one fails, another will hold.

Videos

Resources

critical_armor.txt · Last modified: 2023/07/19 09:02 by josephbaxter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki