Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    “The beginning of wisdom is to call things by their proper name.” as Confucius’ saying

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    4 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Z
      ZATNO
      last edited by ZATNO

      We are at war, unlike the battlefield we do not have the ability to respond with a counterattack that will deter the enemy from attacking us again. We are constantly on the defensive.

      In order to build good defense you need up-to-date intelligence.You will not find up-to-date intelligence in the books written by the best experts in Cyber Warfare. The time that elapsed from the day the first page was written to the day the book was published makes the intelligence found between the pages of the book out of date. Meanwhile the enemy moved on. You will find up-to-date intelligence on sites like NSA and CISA.

      With the exception of governments, no one has the necessary resources to establish a total defense against all enemy threats. Therefore, the next step is to do a risk assessment and mark the threats against which you must defend yourself.
      (Ads in the middle of watching a YouTube clip, inappropriate content of websites and some other trifles are not cyber attack threats).

      Now you need to plan your defense. The planning stage should be done carefully while knowing clearly that the strength of a chain is limited to that of the weakest link in the chain.

      The strength of the defense plan depends totally on the resources available to you. If you do not have all the necessary resources to implement the defense you have planned, you will have to retreat from the first line of defense to the second line of defense and so on.

      An integral part of any defense is the ability to recover. Any recovery plan will require additional resources.
      In the absence of the ability to provide all the resources, it is better to give up one line of defense than to give up the implementation of the recovery plan.

      G Z 2 Replies Last reply Reply Quote 0
      • G
        garrty @ZATNO
        last edited by

        Confucius was really wisdom man

        1 Reply Last reply Reply Quote 0
        • Z
          ZATNO @ZATNO
          last edited by

          @zatno "72% increase in cyberattacks against healthcare sector over the weekend"

          https://www.jpost.com/breaking-news/cyberattack-attempts-towards-israeli-hospitals-thwarted-govt-682221

          1 Reply Last reply Reply Quote 0
          • J
            johneggers
            last edited by

            This post is deleted!
            1 Reply Last reply Reply Quote 0
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.