The ability to protect digital network-connected-assets, such as supervisory control and data acquisition (SCADA) systems and computer-managed infrastructures, from unauthorized monitoring, management or modification. This capability must enable:

  1.    Operational access to Cyber assets to be completely controlled by Users

  1.    Users to maintain and manage Cyber assets via unprotected network

  1.    Cyber assets to be accessible but un-addressable by attackers

Cyber Security