Taxonomy In policy development, it is essential the coverage of the rule is sufficient and precise to avoid ambiguity. A living Suspicious It is common to see such directive in subway, airport, key facilities, incident respond playbook etc. The problem is different Blind Spot When designing controls, we must understand what to protect. There might be blind spot that the intended controls are ineffective Policy #7 The illustrated directive is unclear. Drone, also known as unmanned aerial vehicle, has different form factors. If the sign comes Cyber ... Early days in the industry, we are talking about information security to protect the information so as to minimize the Information Integrity Sometimes, a small mistake will invite question if the information processing facilities are producing accurate result without malicious tempering. The Distance #2 Keeping distance on the road avoids accidents causing injuiry or fatality due to sudden situation changes. Keeping social distance avoids Policy #6 Common pitfalls in writing policies (written directives) are: Embedded assumption by the author that is unknown to other readersFailed to Identify Most often, vendors are proposing security solution in a basket of features. They claim for security suite with unified console Visibility #3 Below the iceberg, there is a large portion that is out of sight. That's why it is dangerous for vessels Visibility #2 Placing a warning sign will avoid facilities being damanged by mistake. But what about the info is misused by threat Governance #2 Successful cybersecurity posture in an organization requires effective cyber protection of its cyber assets. There is a broad interpretation on « Previous 1 … 8 9 10 11 12 … 22 Next »