When a person decides to take up the creation of a security model it is recommended strongly they create a, “Layered Security Model.” Since this involves the safety and security of your electronic-home environment, i.e., your home network and devices including those that are mobile as you carry them with you where ever you go and wherever you are, you don’t have to actually take the step to self-assess your vulnerabilities. The reason, in iSD and in our technological age the predatory efforts are pretty much the same across the board. It is not personal but process and resource based.
The threats out there are the same for everyone so the analysis of the dangers is already done and you are all exposed to them regardless. So, we can go directly to the layered security creation for you. The only self-analysis you may want to consider is this, “Are you willing to make those sacrifices necessary to protect yourself that will involve a considerable discipline to life without?” In order to create your security posture you may have to give up things you have come to expect as an intricate part of your electronic-life.
In addition, you have to take personal responsibility for that security model and posture by accepting the fact that “Others” are not going to go the distance to keep you safe regardless of what their ads and service agreements may or might indicate - on the surface. You have to take personal action and realize that those “Other Security Methods” outside you are simply inadequate. You cannot assume and depend on technological apps, programs and devices to do all the work for you, that is impossible.
You have to create a mind-set and mind-state that says you will put enough protection between the predators and yourself they cannot breach your security and cause you problems, issues and damage.
You may have noticed I did not say, “Create enough security they will go elsewhere and attack those more vulnerable.” I did that because in the tech-age of predatory attacks it does not require any effort at all once a program is triggered and it attacks you. It is one of those things that goes on behind the scenes while the actual person does something else. This is what makes it so nefarious and dangerous, it runs forever through computers, etc. It never tires, it is never disappointed and it never succumbs to fatigue, boredom or breakdown. It is forever and you can only maintain high security status through diligence and continuous on-going effort. Look at it as an alcoholic does when working to remain sober, they are working ever day to stay sober so shall you need to work on it daily to remain safe and secure.
Everything in the Universe is built on yin-yang, the opposites that ebb and flow where one ends when another begins but in this tech cyber war there is no end, it is continuous and infinite unless some catastrophic event happens where all computers, routers, OS’s, etc. die at the same time - ever hear of redundancies?
So, decide before you begin if the danger is real, your exposed and susceptible to the attack and you are willing and able to make those sacrifices necessary to stop the attacks? If you are willing to make the sacrifices then by all means continue to follow this effort as the strategies and tactics to set up that layered security will be presented.
Ok, you have decided to go for it, you want to be safe and secure from predatory cyber-attacks and the following is a view of what layered security would look like in a physical world but in truth those layers will be both physical and electronic/technical.
In the physical security world when you have a object, etc., that if lost would cause great harm and death you build layers of security, combinations of physical protections as well as electronic, that will deter attacks. For iSD, the gaol is to build and maintain layers that will cause the attacks to not penetrate the layers and access your valuable life.
In the physical security world to protect high value and sensitive data and devices you combine; fences, Constantine wire, trenches, more fencing, fencing with electronic detection of heat, vibrations, etc., to trigger alarms of warning, armed guards that patrol. guard towers to observe and protect, locks that deter and slow down efforts to break and breach, ariel surveillance to detect airborne approaches, bollards, etc. to stop direct attacks by vehicles, etc., personal training to stop human social attacks, and so on.
In the electronic-tech world of the matrix-like internet of one’s-n-zero’s we have to combine a human effort and intervention with software driven protections. It must be layered to make it safe and secure. Look at it as the following physical representation but assume the fencing, bollards, towers and trenches are actually cyber-defenses layered.
|
Click for larger view. |