Back Door Each house has its own perimeter to control entry. However behind the perimeter, they are mutually accessible at the back The Race It's about attack and defense in the cyber space. In early days, breaking login is via password brute force attack Cyber Citizen We are really living in the cyber era. From early childhood, kids will touch on device, get connected or even Tagging Tag or label is an important aspect to document cyber assets like hardware components or cabling. This is not an Access Control #2 Access control is intended to allow only authorized subject to reach the protected resources. A comprehensive assessment including penetration test The Past Earlier, I talked about network anomaly detection. It is the kind of technology based on the past activities to predict Automation Everyday, we rely so much on automation ... be seen or behind the scene: rice cooker, temperature control of air Neighborhood As if in physical world, mutual support and care are important to maintain safety in the cyber world. Unlike physical Governance Last article, I talked about PPTP. With organization policies formally established, the next is the governance to make it work. PPT, PPTP People, Process and Technology (PPT) are always referred as the foundation in the cybersecurity community. Yes, they are. But without Preparedness No doubt, we do have deployed and sustained protection as counter-measure against cyber threats. However, the cyber threat landscape is Tunnel "Digital" tunnel is common in the cyber world. The TLS (Transport Layer Security) technology is widely deployed: email server initial « Previous 1 … 14 15 16 17 18 … 22 Next »