When we establish usage terms, we must consider the consequence and adopt the most appropriate wordings. Similar to other system
Time is an interesting phenomenon. It dominates everything both in physical and cyber worlds. All living individual or objects are
Label is commonly seen and required to identify things especially in cables. Without proper identification, it will be tedious in
I saw certain cyber security awareness poster has stated that keeping cyber secure is a shared responsibility. In certain way,
This is typical blacklisting approach. Anti-malware protection is installed in the computer. It stays resident in the kernel and actively
When using technology, usually there is inherent trust that the outcome is correct because it has been tested before going
For free Internet kiosk like this, will you use? In old days when device is rare for Internet ready and
One of the pain points in cybersecurity is the protections are always choosing the "best of breed" technology. This is
The principle of governance is to enforce processes are conducted consistently per established and approved policies or directions in an
A machine in the corner of the mall for digital currency exchange. Whether you use it or not is a
In automation world, cyber components control the machinery or the physical portion. Examples of machinery are turbine, passenger lift, vehicle,
Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement,