Welcome When we establish usage terms, we must consider the consequence and adopt the most appropriate wordings. Similar to other system Time Time is an interesting phenomenon. It dominates everything both in physical and cyber worlds. All living individual or objects are Label Label is commonly seen and required to identify things especially in cables. Without proper identification, it will be tedious in Responsibility I saw certain cyber security awareness poster has stated that keeping cyber secure is a shared responsibility. In certain way, Search & Destroy This is typical blacklisting approach. Anti-malware protection is installed in the computer. It stays resident in the kernel and actively Fault Detection When using technology, usually there is inherent trust that the outcome is correct because it has been tested before going Trust #5 For free Internet kiosk like this, will you use? In old days when device is rare for Internet ready and Orchestration One of the pain points in cybersecurity is the protections are always choosing the "best of breed" technology. This is No Direction The principle of governance is to enforce processes are conducted consistently per established and approved policies or directions in an Trust #4 A machine in the corner of the mall for digital currency exchange. Whether you use it or not is a Physics #3 In automation world, cyber components control the machinery or the physical portion. Examples of machinery are turbine, passenger lift, vehicle, Clarity Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement, 1 2 3 … 22 Next »