Sun Tzu's 13 lessons to combat hackers

Staff Writer
Page 5 of 14  |  Single page

Change your game plan as the enemy changes his

Sun Tzu's 13 lessons to combat hackers

"He who can modify his tactics in relation to his opponent and thereby succeed in winning, may be called a heaven-born captain."

If you follow the evolution of cybercrime, you know the bad guys change their tactics but that means the good guys are (almost) always a step behind.

The past year or two saw attack vectors favour vulnerabilities in web browsers and associated technologies. Now even once-trusted websites have iframe and cross-site scripting vulnerabilities that may infect visitors.

When we opened our networks, we put in firewalls. When the bad guys started manipulating the protocols allowed through firewalls, we installed intrusion-detection systems.

When the time from breach to booty capture shrank, we put in intrusion prevention systems.

Now we're putting in web application firewalls.

We modified our tactics by mandating certified security professionals such as those holding CISSP, CISM, CRISC or GIAC work with these systems. And we're doing more background checks for personnel handling sensitive information.

We also modified our processes to reduce human error and to ensure the design, installation, operation, and maintenance of our infrastructure complies to policies, standards and architectures.

Revise your tactics regularly.
   Revise your tactics regularly.

 

Previous PageNext Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?