The Past Earlier, I talked about network anomaly detection. It is the kind of technology based on the past activities to predict Automation Everyday, we rely so much on automation ... be seen or behind the scene: rice cooker, temperature control of air Neighborhood As if in physical world, mutual support and care are important to maintain safety in the cyber world. Unlike physical Governance Last article, I talked about PPTP. With organization policies formally established, the next is the governance to make it work. PPT, PPTP People, Process and Technology (PPT) are always referred as the foundation in the cybersecurity community. Yes, they are. But without Preparedness No doubt, we do have deployed and sustained protection as counter-measure against cyber threats. However, the cyber threat landscape is Tunnel "Digital" tunnel is common in the cyber world. The TLS (Transport Layer Security) technology is widely deployed: email server initial Clock Clock displays time of day. Time is invisible and exists virtually. Everyone of us has the same amount of time, Tracking In cyber world, logging is fundamental to track electronic activities for problem shooting or digital forensics. With device proliferation especially Aurora In physical world, it is beautiful scenery. In cyber world, Aurora vulnerability refers cyber attack resulting into damage of physical Crowdsourcing Landlord: "Tell me your monthly sales amount." Tenant: "No way, this is confidential business information." With a little trick, such Grade of Protection #2 Certain hotels provide safe for customers storing valuables during their stay. It is somewhat physically robust from brute force opening « Previous 1 … 14 15 16 17 18 … 22 Next »