Clock Clock displays time of day. Time is invisible and exists virtually. Everyone of us has the same amount of time, Tracking In cyber world, logging is fundamental to track electronic activities for problem shooting or digital forensics. With device proliferation especially Aurora In physical world, it is beautiful scenery. In cyber world, Aurora vulnerability refers cyber attack resulting into damage of physical Crowdsourcing Landlord: "Tell me your monthly sales amount." Tenant: "No way, this is confidential business information." With a little trick, such Grade of Protection #2 Certain hotels provide safe for customers storing valuables during their stay. It is somewhat physically robust from brute force opening Resilience How much resilience is sufficient: single, dual, triple, quadruple or more? You need to understand what is the consequence of Perimeter The key difference between physical and cyber perimeters is visibility. To augment physical perimeter limitations, surveillance cameras (probably with video Boundary Typically, the boundary defines a clear demarcation of accountability in the case of ICT or ICS system landscape. It also Mistaken Identity This is to attack trust based on some one you know. In physical world, this is harder as you will Access Control In physical world, access control is done by certain barrier that this barrier will be disabled for entry by authenticated Design & Build Secure by design of ICS (Industrial Control System) is just part of the ICS life cycle. If design is insecure, FUD Fear, Uncertainty, Doubt (FUD) is the tactic vendors are trying to sell you their cybersecurity solution. Typically, this is done « Previous 1 … 15 16 17 18 19 … 22 Next »