One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 409095
Date de publication 2017-08-24 18:20:50 (vue: 2017-08-24 18:20:50)
Titre NBlog August 24 - hot potato or mash?
Texte I'm currently working on a couple of interrelated matters concerning ISO/IEC JTC 1/SC 27 business. One is the possibility of renaming and perhaps re-scoping the committee's work. The other is a study period exploring cybersecurity.They are related because cyber is a hot potato - a bandwagon no less. Some on the committee are raring to disable the brakes and jump aboard.When asked to describe what cybersecurity is, one expert replied "Budget!". That's more than just a cynical retort. Cyber risk, cyber security, cyber threats, cyber attacks, cyber incidents and cyberinsurance are all over the headlines. Several countries have invested in cyber strategies and units. There is money in cyber, so that's a good thing, right?As I've said before, the focus on cyber is problematic for several reasons, not least distinctly different interpretations of the very term, a gaping chasm separating two distinct domains of understanding:In informal use (including most journalists and commentators in the blogophere), cyber means almost anything to do with IT, the Internet in particular. The primary concerns here are everyday hackers and malware (or rather "viruses").In (some?) government and defense circles, cyber alludes to cyberwar, meaning state-sponsored extreme threats exploiting all means possible to compromise an enemy's critical infrastructures, IT systems, comms, economy and society. Compared to the other interpretation, this off-the-scale nastiness requires a fundamentally different approach. Firewalls and antivirus just won't cut it, not by a long chalk. If anything, those everyday hackers and malware are a source of chaff, handy to conceal much more insidious compromises such as APT (Advanced Persistent Threats) and malicious processor hardware/firmware. Authorities stockpiling rather than disclosing vulnerabilities, and building red teams like there's no tomorrow, hints at what's going on right now.As if that's not enough, every man and his dog is either coming up with his own unique definition or ducking the issue by remaining (deliberately?) vague and imprecise. There's little consensus, hence lots of confusion and talking at cross purposes.It is entirely possible that SC 27 might find itself lumbered with the cyber moniker because it's sexy, in which case those diffe
Envoyé Oui
Condensat 1/sc 27032 419 aboard about account addressed advance advanced advertisements again all alley alludes almost always anonymous antivirus any anything appearance apply approach apt are arriving asked aspect attacks august authorities authorize bandwagon bank because been before being bend beyond bill bizarre blogophere bombs box bradley/chelsea brakes branch brings brouhaha budget building business but campaigns card cards case caused certain chaff chalk chasm cheque circles claimed clearly coerced coercion coming commentators committee common comms compared compromise compromises computers conceal concern concerning concerns conflict confusion consensus consequences consider contacts container continuity control controls conventional corporate costly counterfeiting countries couple courses credible credit crime critical cross curious currently cut cyber cyberinsurance cybersecurity cyberspace cybertage cyberwar cynical damage data day defense define definition deliberately department describe despite different disable disclosing distinct distinctly does doesn dog domains don down ducking dump economy edward efforts either election elections electromagnetic email employee employers enemy enormously enough entire entirely even event every everyday examples:the existed experiences expert exploiting exploring exposed extreme fail failure fake fee fictitious financier find firewalls focus fool fraud frauds from full fundamentally gaping garden general global globally: going good government gps hackers hacks handy happens hardware/firmware has have head headlines hence here highly hints his holds horrendous hot house iceberg identity if/when immense implications implied implies imprecise inappropriate incidental incidents including individual infiltration influence informal information infrastructure infrastructures insidious instead intellectual internet interpretation interpretations interrelated invented invested investors involve involvement involving isis iso/iec iso27k issue itself join journalists jtc jump just key lady later leaflets least less letter levels library like likely little loads long looming lots lotto lumbered make malicious malware man management manipulate manning many mash mashup massive matter matters may meaning means media might money moniker more most much nastiness national naïve nblog neglect networks new news nike not now off old one online organizational organizations other over own part particular particularly parties passport payment penny people perhaps period persistent personal physical pickpocketing/theft piracy plays plus point political popping population ports possibility possible post posters posting potato power practice precedent presidential previous primary problematic processor propaganda property pulses pump purposes pyramid qualifications quite radio ransom rare raring rather reasons recent red refers related remaining remit renaming rendering replied requires rest retort right risk role russian sabotage said save say scale scams scenarios schemes scoping secret secrets security sent separating services set several sexy shutdown since snowden societal society some someone somewhere source sponsored standards state stock stockpiling stop strategies study submitting substantial such superpower supplement sure systems taken talking targeting teams technical technology technology: term terrorism than that theft them then there these thing those threats tip tomorrow tools topical total trade tradecraft trainers transaction tricks truth two understanding:in unfortunately unhelpfully unique units untrustworthy use uses using utility vague version very virtual viruses vulnerabilities war water way well what whatever when whether which will wins won work working worlds worse would yet your …
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: