Anyways the technological side is the easiest to 'secure'. In IT security we focus on the unpredictable side 'people, processes, mistakes' not so much the 'tech' because the 'tech is easy to deal with'.
For example we use a 'mapping system' of the technology. In networks we define the critical infrastructure that needs protecting. For example the 'routers, switches' the main ones. They are kept in secure cabinets. We only allow 'security cleared people' to tamper with it. Infact 'highest level', even the people I work with have access to some thing and not others so security is broken down into 'layers'.
We also need to 'configure' the router and switches but we follow 'designs' which tell us what the client needs achieved. Once we know that, we know what port needs to be open depending on their 'needs' such as 'incoming/outgoing'. We need to configure 'vpn tunnels' sometimes when their scared to use 'public' networks of the world, we need to put in 'vpn server' in our routing table. We need to consider if their 'transacting' a-lot or 'storing' information. We need to configure for 'speed' so the department productivity isn't slowed down. That's just 'routers' bro but there is always other concepts in there depending if you need it.
Then we need to look at 'applications' and check the 'code' is suitable to our operating system security and yes we even 'secure' desktops with permissions and anti viruses, their quite extreme I say to waste money on all that but their is different philosophies.
The money we put into licenses is it really worth 'damage' of one PC, especially a PC with low level security anyways? they argue a sophisticated hacker can use that as 'loading' bay to 'navigate' into other areas of the dept. But our 'defence' is in-depth how is going to get thru different 'data' that are password secured? person secured low level rights, hardware secured with cards. Security guys are always arguing about is it 'worth it' because half the time the shit isn't worth it. Like Ras canjeero is it worth all the investment, time, effort, resources to get into his 'phone or laptop' the philosophy argues no it's not because u wasted so much resources for 'nothing' but a 'civilian' dude who has no power in his nation. That's why the hackers in civilian market are not considered 'sophisticated' their like our militias in somalia, u cant compare it to america or the west right? hackers have 'classes' also.
Plus we got a 'coder' in our team who 'writes' codes for different 'kernals'. It's copy n paste that, it's called a 'language' or 'script' like algebra. It's already been defined. U want the code to execute instructions on the computer, so u need to know how to 'instruct' it, it's all languages wallahi. I am not interested in coding, but once u learn the 'kernel' langauge, u can write a code quite quick for it. Coders are usually paid the least in our team cuz the 'answers' are available in the kernel language u just copy it over into your coding platform and compile.
Anyways the important area is 'networks' because u can't breach into a PC if u dont get past the routers and switches anyways.