Trust #5 For free Internet kiosk like this, will you use? In old days when device is rare for Internet ready and Orchestration One of the pain points in cybersecurity is the protections are always choosing the "best of breed" technology. This is No Direction The principle of governance is to enforce processes are conducted consistently per established and approved policies or directions in an Trust #4 A machine in the corner of the mall for digital currency exchange. Whether you use it or not is a Physics #3 In automation world, cyber components control the machinery or the physical portion. Examples of machinery are turbine, passenger lift, vehicle, Clarity Policies must be written precisely. That said, clarity is essential or otherwise it will create dispute, confusion in policy enforcement, Protocol Protocol requires proper data format and valid ranges in different preset fields per design to work properly. Threat actors are Freedom This is relatively speaking. Freedom is granted to certain extend. In physical world, what stops us doing bad things? It's Warning Message #2 In physical world, warning sign is to alert you in keeping you safe. In cyber world, warning message might be Defeated Control #2 Other than controls must be enforceable, controls must also be robust because a defeated control will be an access gateway Availability Typical security objectives of cybersecurity are confidentiality, integrity and availability. It's just how they are prioritized in dealing with different Architect In physical world, an architect is "a person whose job is to design new buildings and make certain that they « Previous 1 2 3 4 … 22 Next »