Born or Made Cybersecurity vulnerabilities are broadly categorized into 2 types: [a] Inherent weakness in the component, protocol (e.g. PLC, ftp) that is Direction Establishing cyber directives (policies) is challenging. On one hand, the language must be chosen not too specific for flexibility but End of Road In physical journey, there is always an end such as End of vacation, back to workRoad blocked by obstacle, detour Big or Small Cyber assets, no matter big or small, must be managed via the same practice and same maintenance regarding cybersecurity as Dormant Malware nowadays is getting sophisticated - has small footprint, evade sandbox & detection, determine platform to inject the applicable payload, Deep Packet Inspection (DPI) As cyber attacks have already moved from network layer to application tier, DPI is a must to examine contents to Expectation & Limitation Every technology has its own limitation. Don't just listen to Sales or look at Product Brochure. Their tactics are to Point of Attraction Everything has multiple perspectives. A point of attraction could become the point of attack. Example is setting up web site Retrofit Three scenarios: (a) fix design flaw to make system secure, (b) address new vulnerabilities that are unknown before, or (c) Trust #2 When Internet is just launched to the consumer market, it's costly. Need to subscribe the service from your local Internet Shoulder Surfing No matter how the end point is secured, a careless end user will nullify all the deployed counter-measures like MDM Trust When you come across a free USB socket to charge your mobile device, will you trust and use it? You « Previous 1 … 13 14 15 16 17 … 23 Next »