Logo Object Oriented Cybersecurity Detection Architecture (OOCDA) Suite
Executive Summary Start Author Project Map

Frequently Asked Questions (FAQ)
FAQ can be boring, uninformative and has no real value to the readers.
We are technical and the phrase we mostly use is:

       "what is the punch line."

Our FAQ is the punch lines for the following.

       • Executives
       • Managers
       • Developers
       • Analysts
       • Architects


We are not going to present any Cybersecurity definition. Our definitions are presented with images and examples.

Introduction:
Our Object Oriented Cybersecurity Detection Architecture (OOCDA) Suite is a new level of thinking, architecting, designing, analysis, management, developing, testing and the main goal is detecting. Therefore our OOCDA Suite punch line is:

       "Cybersecurity needs to take a different approach since current approaches are not working."

Virtual Server and File Folder - New Way of Thinking:
Asking any computer user including the young about how to create a folder and store files within this folder. The answer would be easy since that is what most computer users do and Windows and any operating system support. When it comes virtual server (what we call container) and ask the same group how to create virtual server or virtual machine, the result would not be the same nor does Windows and any operating system Virtual Machine creation tools. Our thinking of virtual servers or virtual machines should the same way we think of file folders.

The Future of Cybersecurity:
The future of Cybersecurity detection is implementing Virtualization, Intelligence, automation and integration.
Our OOCDA Suite is just that.

Executives:

       "There are two types of companies: those who know they were hacked and those who do not know they had been hacked".

Executives' main concerns are cost, the return on the investment, risks, time to build, maintenance, social media and the future of the system. Sadly through away projects are well accepted as a way of life.

Cost and Return on Investment:
The most important part of any Cybersecurity system is testing and it must pass all tests. Our OOCDA Suite is nothing but tiers or groups of virtual servers (same as the folder concept) or containers with their virtual components (running applications same concept as files). Their automation and intelligence is nothing more than math formulas-algorithms. The code can be developed using Java, Python, and Linux, Unix and Windows scripts. Since we are creating Object Oriented Cybersecurity Detection Object (in a simple word a program) which uses reusable code or objects. The saving in efforts and time and resources in reusable object has hundreds of folds in return.

Risks:

       "September 09,2021, the Russian tech giant Yandex was hit with the biggest DDoS Attack ever"
       "In early 2020, SolarWind's and more than 30,000 public and private organizations were hacked"


Executives need to take the risk in building new systems and not depend on Cybersecurity vendors. The only risk which they would be taking is the cost of building and testing new system with fresh ideas such as Object Oriented Cybersecurity Detection. These new systems are not throw away projects but at the worst case scenario, they are trial until success and the freedom from vendors dependencies.

Effort, Time to Build and Maintenance:
OOCDA Suite new concepts, tools, approach and developments with management and testing had be simplified and presented with examples and code to help new comers think and develop our OOCDA Suite with ease. The only thing we are not building is "One Size fits all". Based on the business and their clients, system customization and attention to details are a must.

Managers:
How important is management?
Management is critical to the success of institutions, projects or even a trip or a vacation. Management performs planning, organizing, staffing, leading, directing, controlling, monitoring, budgeting, testing, documentation and motivation. in short, management is the difference between making it or breaking it.

Managers need to look at our automation of management using our PMP which is created based on Project Management Institute (PMI) - Approach (processes). We have to admit that some of processes need updating nevertheless we are willing to work with any new thinking, tools, approaches, ..etc.

Developers
We started as developers and we never forget that developers are the foot soldiers. Our OOCDA Suite architect-design is simple and we also provide seed frameworks and code. The OOCDA Suite data structure and data storage are not rocket science, but simple new extension of what are already been used. There is a number of example and code represented in our webpage for developers to examine.

Analysts:
As for as we are concern, analysts would enjoy our web presentation. Our Images are designed to put a picture to the concept we are presenting. Simplicity is our trade secret and we did our best to make complex concepts easier to comprehend and implement.

Architects:

OOCDA Suite Structure
Image #1


Image #1 represents our OOCDA Suite structure which does not look that simple, but the reality is our OOCDA Suite is a simple architecture presenting new and numerous complex and hard to envision containers and components. The flow of clients' requests, data, storage, detection and services through our virtual intelligent and automated server-containers is the basis for our architect. DevOps and DataOps are the foundation we are building everything on. See our DevOps Editors prototypes for our illustration of the power of virtualization. copy Vertical and Horizontal Scalabilities

Vertical and Horizontal Scalabilities
Our OOCD Suite is composed of a number of virtual tiers and virtual components. Creating or deleting any number of tiers and their components can be automated. Creating any number of a specific tier and their components can also be created on the fly to handle traffic loads. For example, Big Data and CRM Services may not be required by clients with limited number of customers or services. Our OCCD suite Virtual Cloud Buffer creations and deletions would be automated to handle malware attacks. Machine Learning support would be combined to deter DDoS Attacks.

Vertical Scalabilities:
Each virtual tier would be able to vertically create any number of its components to increase performance, speed and handling different requests.

Horizontal Scalabilities:
One of more Virtual tier can added as needed to increase performance, speed and handling different requests. The best example of Horizontal Scalabilities would be (as in the case DDoS Attack on the Russian tech giant Yandex - the biggest DDoS Attack ever) performing the following:

Create new OOOCD Suites with new IP addresses and pass the new IP addresses to known clients as dedicated cloud service.
Hackers would not be able to pass beyond our Virtual Cloud Buffer even if they were to add their malicious code to our Virtual Cloud Buffer.
Use both Virtual Cloud Buffer and Machine Learning tools to figure all the bogus calls and add them to new OOCD objects to handle them without the need of using firewalls. See our Light Weight OOCD in Object Oriented Cybersecurity Detection (OOCD) page.
Using our OOCD inheritance functionalities would add the handling of such attacks and all the attack's features, methodologies and approaches.

Performance
Performance would measure by the performance speed of the detection protection and the creation of detection-protection itself. Only the needed virtual services or detection objects would be created. All the services and detection objects are virtual and scalable. The newly discovered hackers' IP addresses or malicious code be used immediately by OOCD inheritance features and no need to depend firewalls or any vendors support.