Quotes from the book "The fifth domain"
After land, sea, air, and space, warfare has entered the fifth domain: Cyberspace. That's what this book "The Fifth Domain" sheds light on.
Resilience is the capacity of any "entity... to prepare for disruptions, to recover from shocks and stresses, and to adapt and grow from a disruptive experience.
One of the recommendations was that when the NSA finds a hole in widely used software, it should tell the manufacturer, with rare exceptions. Those exceptions would be approved at a high level by the government.
If we have data, let's look at data. If all we have are opinions, let's go with mine.
There are two kinds of companies: those that have been hacked and know it; and those that have been hacked and don't.
Needs to do to protect itself fits into one of five core "functions": Identify, Protect, Detect, Respond, and Recover.
Software was not built to be used, it was built to be bought by someone at the top.
Cybersecurity Framework's five functions: Identify, Protect, Detect, Respond and Recover (what he calls "things that I do"). He put those across the top of his matrix. Down the side, he wrote out the five common asset classes: Devices, Apps, Networks, Data, and users (what he calls "Things that I care about"). He then started to fill in the matrix with technologies.
The 1990s were the Protect decade, the 2000s were the Detect decade, and the 2010s were the Respond decade, then the 2020s will be (drumroll, please...) the Recover decade.
Taking a sample of almost 10,000 pieces of malware collected from the late 1980s to 2008, he showed that the average number of lines of code in malware stayed consistent at a relatively tight 125 lines.
There are only bad options. It's about finding the best one.
cutting-edge companies in cybersecurity today are doing three things: looking at traffic moving within company networks for signs of malicious activity; detecting malicious activity on individual computers (endpoint detection); and making product purchases and architecture decisions to favor the defender.
Cybersecurity think tank, puts the cost of a data breach at $141 per lost record.
The insurance policies would not cover the two most expensive effects of cyber breaches: reputational damage and intellectual property theft.
Learn to work from the command line in Linux, learn the programming language Python, and then take a penetration testing course.
Cyberspace is not borderless; rather, everyone lives on the border.
The absence of evidence is not the evidence of absence.
Whoever becomes the leader in AI will become the ruler of the world.
Those not shocked when they first come across quantum theory cannot possibly have understood it.
Passwords are like underwear. Don't let people see them, change them often, and don't share them with anyone.
Comments