Dormant Malware nowadays is getting sophisticated - has small footprint, evade sandbox & detection, determine platform to inject the applicable payload, Deep Packet Inspection (DPI) As cyber attacks have already moved from network layer to application tier, DPI is a must to examine contents to Expectation & Limitation Every technology has its own limitation. Don't just listen to Sales or look at Product Brochure. Their tactics are to Point of Attraction Everything has multiple perspectives. A point of attraction could become the point of attack. Example is setting up web site Retrofit Three scenarios: (a) fix design flaw to make system secure, (b) address new vulnerabilities that are unknown before, or (c) Trust #2 When Internet is just launched to the consumer market, it's costly. Need to subscribe the service from your local Internet Shoulder Surfing No matter how the end point is secured, a careless end user will nullify all the deployed counter-measures like MDM Trust When you come across a free USB socket to charge your mobile device, will you trust and use it? You Real Image Virtualization is great technology deployed in ICT (or even ICS). There are many merits for live system or application development Technology Technology helps avoiding mistake, operating continuously and enforcing certain outcome. However, technology is designed and deployed by human. There must Manual Control - Rare to Find Yes, it is and mostly replaced by automation which is everywhere nowadays: Be seen like car park entry/exit control, house Policies #4 In stipulating policies (written management directives), the hard part is in the language for having specific objective with flexibility and « Previous 1 … 12 13 14 15 16 … 22 Next »