One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 446680
Date de publication 2017-12-08 10:10:13 (vue: 2017-12-08 10:10:13)
Titre NBlog December 8 - cybersecurity awareness story-telling
Texte Conceptual diagrams ('mind maps') are extremely useful for awareness purposes.  This one, for instance, only has about 50 words but expresses a lot more than could be said with ~50 words of conventional prose:Despite it being more than 7 years since I drew that diagram in Visio, it immediately makes sense. It tells a story. Working clockwise from 1 o'clock, it steps through the main wireless networking technologies that were common in 2010, picking out some of the key information security concerns for each of them.  It's not hard to guess what I was thinking about.The arrows draw the reader's eye in the specified direction along each path linking together related items. Larger font, bold text and the red highlight the main elements, leading towards and emphasizing "New risks" especially. Sure enough today we have to contend with a raft of personal, local, mesh, community and wide area networks, in addition to the those shown. When the diagram was prepared, we didn't know exactly what was coming but predicted that new wireless networking technologies would present new risks. That's hardly ground-breaking insight, although pointing out that risks arise from the combination of threats, vulnerabilities and impacts hinted at the likelihood of changes in all three areas, a deliberate ploy to get the audience wondering about what might be coming, and hopefully thinking and planning ahead.It's time, now, to update the diagram and adapt it to reflect the current situation for inclusion in January's awareness module. The process of updating the diagram is as valuable as the product - researching and thinking about what has changed, how things have changed, what's new in this spa
Envoyé Oui
Condensat  in  sure  when  working 2010 about adapt addition to ahead all along although angles apps are area areas arise arrows audience awareness back based being believed blog bold breaking but byod changed changes christmas clock clockwise combination coming common community conceptual concerns configuring contend conventional could current cybersecurity december deliberate diagram diagrams didn direction draw drew each elements emphasizing enough especially etc exactly example expresses extremely eye font from fun geek get gift giving ground guess hard hardly has have highlight hinted hopefully how immediately impacts inclusion information insight instance instance: iot items january keeps key know larger leading light likelihood linking local lot main makes maps merely mesh might mind mobile module more nblog networking networks new not now one only out path personal phones picking piece planning ploy pointing possible predicted prepared present probably process of product prose:despite purposes qualifies raft reader red reflect related researching risk risks said seasonal security sense shown shows since situation some space specified steps story take technologies technology telling tells text than that them things thinking those threats three through time today together towards tree trivial update updating useful valuable visio vulnerabilities web what wide wireless wondering words would years yesterday ~50
Tags Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: