Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 4 of 14  |  Single page

Be wise, prepare for peril

Sun Tzu's 13 lessons to combat hackers

"The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable."

Many organisations have the attitude "it won't happen to us" and many are right, they may never experience a cyber incident.  But cyber attacks are happen daily and many have paid dearly as a result.

Sun Tzu advises to be prepared.

One of the best ways to prepare is to follow a disciplined, structured, flexible, extensible and repeatable process for achieving risk-based protection related to the operation and use of information systems. One of the best sources for such information is the US NIST risk-management framework.

Managing the risk posed to information assets requires:

  • A clear, communicated policy
  • Classifying and labelling information
  • Identification and valuation of ICT assets
  • Processes for use, distribution, storage and disposal
  • Awareness of threats
  • Awareness of your security state
  • Security training
  • Detection and reporting of intrusions and misuse
  • Correcting problems
  • Periodic assessment

Pretending there's no problem is no answer to computer security.
   Pretending there's no problem is no answer to computer security.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?