The ability to protect digital network-connected-assets, such as supervisory control and data acquisition (SCADA) systems and computer-managed infrastructures, from unauthorized monitoring, management or modification. This capability must enable:


  1.    Operational access to Cyber assets to be completely controlled by Users


  1.    Users to maintain and manage Cyber assets via unprotected network


  1.    Cyber assets to be accessible but un-addressable by attackers



Cyber Security