Intrusion detection and prevention systems are the most reliable form of securing APT incidences and the overall security of the information infrastructure. This is because, unlike susceptibility and management systems and IT infrastructure support, they have the capacity to detect occurrences of APT and subsequently prevent damage to the computer systems. Firewalls are supposed to block illicit impound traffic, but in most instances, they do not succeed. Intrusion detection and prevention systems have the capability to detect and catch threats missed by the firewalls. Susceptibility management systems are used to identify, remediate and mitigate vulnerabilities in computer networks but are not always effective because attackers changer their tools and techniques in respect to exploiting the flaw. Even if, the organization analyze all the top threats by malware site and location, these parameters changes and new points of attacks are implemented.
An example of such a framework is the National Cyber Security Framework. It is a cyber security framework that encapsulates legislation, regulations, advancement in technology, public and private participation, institutional and international aspects of security. The framework falls under the Malaysian National Cyber Security Policy which encompasses the management of ten critical of information systems in the country. The areas of interest include; national defense and security, banking and finance, transportation, government services, water, emergency operations, food and agriculture and health services. NCSF outlines the protocols and management approaches of all the security threats, vulnerabilities and approaches in all the stated sectors.
It is important because it develops the standards for classifying security threats in a given sector and protocols with which information systems are to be managed. The existence of a cyber security framework provides the basis for developing applications that define, detect and prevent threats and vulnerabilities.
Reference
Bidgoli, H., 2004. The internet encyclopedia:. s.l.:John Wiley & Sons.
Ciampa, M. D., 2011. Security+ Guide to Network Security Fundamentals. s.l.:Cengage Learning.
Kramer, F. S. S. &. W. L., 2009. Cyberpower and national security. s.l.:Springer.
Nye, J. S., 2008. Cyber insecurity. Project Sindicate, Decenber.