Design & Build #2 A deployed function looks not elegant. Is this due to design problem, or deployment is not in accordance to the Defeated Control When designing security controls, it is necessary to determine if the controls can be executed effectively. Somehow due to unexpected Proper Usage Roads connect different destinations in physical world. Every road user (vehicle or any kind, pedestrian or live objects) has to Connection The cyber world is built up by connecting different systems and devices via information highway. Therefore, the key cybersecurity element Accountability To run a business, there are always business risks. It is a matter of how much risk acceptance is comfortable. Visibility In physical world, this creates uncertainties for moving forward. In the cyber world, this means even more. From business perspective, Access Control #3 Controlling cyber (or network) access is always a main concern to limit threat vectors for lateral movement once they have Credential It's the secret to access your protected resources in the network, or the cyber space. Therefore, you have to keep Anonymity Privacy is a major concern nowadays. Sensitive info need to be tokenized or masked while leaving functional info unchanged during Certificate Cyber Security practitioners need to acquire relevant certification or credential in demonstrating domain expertise or competency. Learning is life time Recovery We heard a lot to have frequent backup as mitigation measure to recover system from attack, most likely from ransomware. Life Cycle Management #2 Like in physical world, automation components do have life time. Example is mechanical attributes of traditional hard disk drive, they « Previous 1 … 9 10 11 12 13 … 22 Next »