Enforcement #2 Durnig pandemic situation, InfraRed body temperature detection technology is great - contactless, accurate, multi-persons processing, seamlessly and transparent to customers. Concealment Two lanes but 3 traffic signs. Is the middle lane hidden? Information concealment is one of the techniques to hide Choke Point In physical world, it is a geographical critical and strategic passage. Armed force is able to control what is allowed Governance, Risk & Compliance GRC is the typical jargon when we talk about the cybersecurity posture in an organization. Risks, no matter in terms Grade of Protection #3 The commodities (toys) are encapsulated in the vending machine (plastic containers). All containers share the same Point of Sales (PoS) Policy #8 We face many "policies" (directives) everyday - whether in real world or in the cyber space. And we are told DeMilitarized Zone (DMZ) DMZ becomes the de facto standard for network segmentation. It is used to control network traffic across trust and untrusted Reinforcement Sometimes, security protection needs reinforcement to avoid deterioration of effectiveness over time. This can easily be visualized in real world. Enforcement Enforcement Having policy as written document isn't enough. If there is violation, it must be enforced thru correctional approach. In Assumption #3 When we develop written directive, there might be chance that certain elements are assumed and be implicit. It is essential Taxonomy #2 I have seen cybersecurity directive regarding applicability is to protect OT (Operational Technology) system so as to minimize cyber attacks Landscape Some cybersecurity practitioners only drill down to the level of details of network diagram or even wiring diagram to identify « Previous 1 … 7 8 9 10 11 … 22 Next »