The Forgotten Place #5 It is self-explanatory. There are similar faults posted previously. Risk of consequence must be understood before deploying information automation tool. Address There is a key difference between physical and cyber worlds. In physical world, addresses for non-military areas are public. You Security By Trust In physical world, we trust this glass roof is safe and secure to walk on because there are underlying processes Welcome When we establish usage terms, we must consider the consequence and adopt the most appropriate wordings. Similar to other system Time Time is an interesting phenomenon. It dominates everything both in physical and cyber worlds. All living individual or objects are Label Label is commonly seen and required to identify things especially in cables. Without proper identification, it will be tedious in Responsibility I saw certain cyber security awareness poster has stated that keeping cyber secure is a shared responsibility. In certain way, Search & Destroy This is typical blacklisting approach. Anti-malware protection is installed in the computer. It stays resident in the kernel and actively Fault Detection When using technology, usually there is inherent trust that the outcome is correct because it has been tested before going Trust #5 For free Internet kiosk like this, will you use? In old days when device is rare for Internet ready and Orchestration One of the pain points in cybersecurity is the protections are always choosing the "best of breed" technology. This is No Direction The principle of governance is to enforce processes are conducted consistently per established and approved policies or directions in an 1 2 3 … 22 Next »