Protection In business world, resources are limited and must be best utilized for purpose. How much protection is sufficient, especially in Remote Control This facility is common in our daily life for convenience with digital function components. Examples that we are familiar with Anomaly Observations are basis in any informed-assessment to understand if operations are compliance to rules & regulations meeting the expected standards. Obsolescence One of the biggest challenges in OT (Operation Technology) system is the technology obsolescence. Here, we are not talking about Treat or Trick #2 I talked about "strengthening human awareness cannot be overlooked". The easiest penetration into a corporate network is via phishing email. Purpose of Control #2 When we deploy control, we must understand what is the purpose of the control. I came across certain cybersecurity practitioners Access Path A path is required at the barrier or perimeter for a number of reasons: reachability to/from destination with legitimate needs Control #4 The "Exit" has demonstrated various types of control to secure the physical perimeter while enable a "kill switch" to emergency In The Cloud We always hear people telling everything is now in the Cloud. Precisely, this is somehow incorrect. Even though there are Perimeter #3 One of the key controls in cyber world is the ingress/egress points to the network. Without sufficient control, threat actors Shared Responsibility I saw some awareness posters that cyber security is a shared responsibility. No doubt each of us plays a different Policy #12 In the illustration, there is implicit EXCEPT WITH PERMIT in real life. However, the bilingual "except's" are inconsistent.The Chinese version 1 2 3 … 24 Next »