Forwarded from Thérèse
From the article, he is working for Asian companies rather than American.
Forwarded from Azazel News (Tee⛳️)
Step 1: Identify critical information: Understand what information is sensitive
The first step is to determine what data would be particularly harmful to the organization if an adversary obtained it.
This includes intellectual property, employees' or customers' personally identifiable information, financial statements, credit card data and product research.
Critical information is any information you have in your device that could be used against you, given you are toughened enough to keep those inside your head a secret even under torture or similar circumstances.
The first step is to determine what data would be particularly harmful to the organization if an adversary obtained it.
This includes intellectual property, employees' or customers' personally identifiable information, financial statements, credit card data and product research.
Critical information is any information you have in your device that could be used against you, given you are toughened enough to keep those inside your head a secret even under torture or similar circumstances.
Forwarded from Azazel News (Tee⛳️)
Step 2: Threat assessment: Identify potential cybersecurity threats.
The next step is to identify who is a threat to the organization's critical information.
There may be numerous adversaries who target different information, and companies must consider any competitors or hackers who might target the data.
The goal of threat analysis is to understand how adversaries could target an organization and use information to their advantage.
The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit critical information and indicators.
Organizations should seek support from their security, intelligence, and counterintelligence experts
The next step is to identify who is a threat to the organization's critical information.
There may be numerous adversaries who target different information, and companies must consider any competitors or hackers who might target the data.
The goal of threat analysis is to understand how adversaries could target an organization and use information to their advantage.
The threat analysis includes identifying potential adversaries and their associated capabilities and intentions to collect, analyze, and exploit critical information and indicators.
Organizations should seek support from their security, intelligence, and counterintelligence experts
Forwarded from Azazel News (Tee⛳️)
Step 3: Vulnerability analysis: Identify weaknesses in security
In this stage, the organization examines potential weaknesses among the safeguards in place to protect critical information and identifies which ones leave it vulnerable.
This step includes finding any potential lapses in physical and electronic processes designed to protect against the predetermined threats or areas where a lack of security awareness training leaves information open to attack.
To perform vulnerability analysis, an OPSEC analyst must consider the adversary's perspective and try to identify any susceptibilities that could be exploited.
This includes:
• The types of activities an adversary could observe
•The types of information an adversary could collect
•Organizational weaknesses that an adversary could exploit
•Potential gaps in physical or electronic processes
•Areas where a lack of security awareness training could leave information vulnerable
In this stage, the organization examines potential weaknesses among the safeguards in place to protect critical information and identifies which ones leave it vulnerable.
This step includes finding any potential lapses in physical and electronic processes designed to protect against the predetermined threats or areas where a lack of security awareness training leaves information open to attack.
To perform vulnerability analysis, an OPSEC analyst must consider the adversary's perspective and try to identify any susceptibilities that could be exploited.
This includes:
• The types of activities an adversary could observe
•The types of information an adversary could collect
•Organizational weaknesses that an adversary could exploit
•Potential gaps in physical or electronic processes
•Areas where a lack of security awareness training could leave information vulnerable
Forwarded from Azazel News (Tee⛳️)
Step 4: Assess risks
Risk assessment is a key step in the Operations Security (OPSEC) process, which is a strategy and process for managing risk and security. The goal of OPSEC is to protect sensitive information and prevent it from falling into the wrong hands
In a risk assessment, you compare threats and vulnerabilities to determine the potential risk of adversary intelligence collection activities.
This includes assessing How likely it is that you will be targeted, information exploited and the consequences of exploiting your information
The level of risk you determine will help you decide if you need to assign a countermeasure to a vulnerability.
For example, if the vulnerability is high and the adversary threat is clear, you might expect adversary exploitation and assess the risk as high. In this case, you would need to implement countermeasures to mitigate the risk or reduce it to an acceptable level.
However, if the vulnerability is low and the adversary's collection ability is moderate or low, you might determine the risk as low and not require any protective measures
Risk assessment is a key step in the Operations Security (OPSEC) process, which is a strategy and process for managing risk and security. The goal of OPSEC is to protect sensitive information and prevent it from falling into the wrong hands
In a risk assessment, you compare threats and vulnerabilities to determine the potential risk of adversary intelligence collection activities.
This includes assessing How likely it is that you will be targeted, information exploited and the consequences of exploiting your information
The level of risk you determine will help you decide if you need to assign a countermeasure to a vulnerability.
For example, if the vulnerability is high and the adversary threat is clear, you might expect adversary exploitation and assess the risk as high. In this case, you would need to implement countermeasures to mitigate the risk or reduce it to an acceptable level.
However, if the vulnerability is low and the adversary's collection ability is moderate or low, you might determine the risk as low and not require any protective measures
🫡2
Forwarded from Azazel News (Tee⛳️)
Step 5: Apply Countermeasures
Countermeasures are intended to prevent an adversary from successfully obtaining critical information.
Countermeasures should be applied when the level of risk is determined to be unacceptable and are implemented to mitigate risk or to reduce risk to a more acceptable level.
Countermeasures can include:
•Educating yourself: Learn about threats and vulnerabilities
•Using security precautions: Use physical, personal, and cyber security measures
•Enforcing policies: Create new policies around sensitive data
•Manipulating an adversary's perception: Hide or control indicators, vary routes, or modify schedules
•Using technological solutions: Encrypt files, use multi-factor authentication, or segment networks
Countermeasures are intended to prevent an adversary from successfully obtaining critical information.
Countermeasures should be applied when the level of risk is determined to be unacceptable and are implemented to mitigate risk or to reduce risk to a more acceptable level.
Countermeasures can include:
•Educating yourself: Learn about threats and vulnerabilities
•Using security precautions: Use physical, personal, and cyber security measures
•Enforcing policies: Create new policies around sensitive data
•Manipulating an adversary's perception: Hide or control indicators, vary routes, or modify schedules
•Using technological solutions: Encrypt files, use multi-factor authentication, or segment networks
Forwarded from Youcanrunbutnothide
I question his allegiance to the US especially after being let go twice at his peak - once with the US special forces and second with Palantir where he must have had access to high level information. That 'let go' can make a person bitter especially one with a broken childhood. Also, Blackpanda...hmmm sounds red faction to me 🤔
Forwarded from martian
In the tv show, research data on Lunar water was wiped from the Luna Data Storage but there is a hard copy
Forwarded from martian
Balhae station has something that, one the first looks like mul gwishin (water ghost), and she is a sole survivor
Forwarded from martian
Astrobiologist is conductiong her own research, as she had a sneak peak into files right before the mission
Forwarded from martian
One she follows a child to her den, Astrobiologist founds a hard drive
Forwarded from martian
Media is too big
VIEW IN TELEGRAM
The cost of ambition of a scientist, and the symbolism at the end showing both 🟦 and 🟥 colors in the background
Forwarded from martian
Not going much in the psychology of crew members it's all clear, just to mention that I personally like the fact that reading main characters facial expressions is so hard.
Forwarded from martian
Considering their water crisis, I want you to think about if human experiments similar to one you saw above are justified or not.
If saving humanity justifies children sacrifice.
Knowing that human trial is a mandatory phase for high % of medicine, supplement, face care cream in the bubble world, and knowing that 🟥 will probably be the one who try to own/take over the solution to the problem.
If saving humanity justifies children sacrifice.
Knowing that human trial is a mandatory phase for high % of medicine, supplement, face care cream in the bubble world, and knowing that 🟥 will probably be the one who try to own/take over the solution to the problem.
❤1
Forwarded from Azazel News
ECOticias.com
China has just broken a barrier that physicists believed to be unbreakable for decades, and its 150 million-degree artificial sun…
China’s EAST ‘artificial sun’ pushed plasma beyond the Greenwald density limit, a breakthrough that could accelerate practical fusion power.