A cyber
system including a method of providing cyber
security as a service is provided. The cyber
system may include an integrated architecture of defensive and offensive security procedures and processes that enable enterprises to practice safe, holistic security techniques. The plurality of cyber defense procedures may include a plurality of risk-based assessment procedures, a plurality of
attack-prevention procedures, a plurality of detection procedures and a plurality of response and
recovery procedures. The plurality of cyber offense procedures may include a plurality of cyber weapon procedures, a plurality of cyber Intelligence, surveillance and reconnaissance procedures, a plurality of
information operations target exploitation procedures and a plurality of
information operations attack procedures. The cyber
system may also include a plurality of overlapping processes interconnecting the plurality of cyber offense procedures and plurality of cyber defense procedures. The plurality of overlapping processes may include a
change management, a
configuration management, a
service desk and a service-level management. The
change management may be structured within an enterprise for ensuring that changes in people, facilities, technology and / or processes are smoothly and successfully implemented to achieve lasting benefits. The
configuration management may establish and maintain the consistency of a product's performance, functional and physical attributes with its requirements, design and operational information throughout its life. The
service desk may provide the communication needs of the users, employees and customers. Service-level management may assess the
impact of change on
service quality and establish performance
metrics and benchmarks.