iSD in the Tech Age!



Net-self-defense, we spend an exorbitant amount of time on our physical defense training and then we forget that our lives are in just as much danger of "Grave Financial Harm" or Financial ruin (Death) as if we are attacked by a street predator. Research and studies show, from the security experts in this field, that Anti-virus and Firewall suites only catch about 5% of the threats out there and those same folks tell us that it is in all probability worse at the Enterprise levels.


My goal here is to educate myself, and by proxy, pass on what I learn to others so that each individual who is connected at any level can take steps to achieve some semblance of security in their electronic on-line lives. We are so deeply imbedded in modern technology that to not take appropriate actions to learn iSD or internet self-defense in the technological age is just foolishness.


My goal is to provide enough of a foundation that readers, like me, can take the appropriate actions, i.e., apply those fundamental principles of technological methodologies to safeguard one of the more important, actually critical, strategies and tactics to defend ourselves from grave economical harm or even economical/financial death or ruin from nefarious predatory hacking processes.


Nothing in this blog is definitive, it is meant to set a foundation of knowledge, understanding and awareness so that you are not one day blindsided by some effort to steal your very life out from underneath you so fast you feel like you have been hit behind the ear and knocked into a daze of confusion, fear and finally anger where your tech-life falls apart and ruins your real life utterly, completely and with no light in sight down that dark, empty and black hole.


Wednesday, February 24, 2016

Layered Security Goal

Blog Article/Post Caveat (Read First Please: Click the Link)

When a person decides to take up the creation of a security model it is recommended strongly they create a, “Layered Security Model.” Since this involves the safety and security of your electronic-home environment, i.e., your home network and devices including those that are mobile as you carry them with you where ever you go and wherever you are, you don’t have to actually take the step to self-assess your vulnerabilities. The reason, in iSD and in our technological age the predatory efforts are pretty much the same across the board. It is not personal but process and resource based.

The threats out there are the same for everyone so the analysis of the dangers is already done and you are all exposed to them regardless. So, we can go directly to the layered security creation for you. The only self-analysis you may want to consider is this, “Are you willing to make those sacrifices necessary to protect yourself that will involve a considerable discipline to life without?” In order to create your security posture you may have to give up things you have come to expect as an intricate part of your electronic-life. 

In addition, you have to take personal responsibility for that security model and posture by accepting the fact that “Others” are not going to go the distance to keep you safe regardless of what their ads and service agreements may or might indicate - on the surface. You have to take personal action and realize that those “Other Security Methods” outside you are simply inadequate. You cannot assume and depend on technological apps, programs and devices to do all the work for you, that is impossible. 

You have to create a mind-set and mind-state that says you will put enough protection between the predators and yourself they cannot breach your security and cause you problems, issues and damage. 

You may have noticed I did not say, “Create enough security they will go elsewhere and attack those more vulnerable.” I did that because in the tech-age of predatory attacks it does not require any effort at all once a program is triggered and it attacks you. It is one of those things that goes on behind the scenes while the actual person does something else. This is what makes it so nefarious and dangerous, it runs forever through computers, etc. It never tires, it is never disappointed and it never succumbs to fatigue, boredom or breakdown. It is forever and you can only maintain high security status through diligence and continuous on-going effort. Look at it as an alcoholic does when working to remain sober, they are working ever day to stay sober so shall you need to work on it daily to remain safe and secure. 

Everything in the Universe is built on yin-yang, the opposites that ebb and flow where one ends when another begins but in this tech cyber war there is no end, it is continuous and infinite unless some catastrophic event happens where all computers, routers, OS’s, etc. die at the same time - ever hear of redundancies? 

So, decide before you begin if the danger is real, your exposed and susceptible to the attack and you are willing and able to make those sacrifices necessary to stop the attacks? If you are willing to make the sacrifices then by all means continue to follow this effort as the strategies and tactics to set up that layered security will be presented. 

Ok, you have decided to go for it, you want to be safe and secure from predatory cyber-attacks and the following is a view of what layered security would look like in a physical world but in truth those layers will be both physical and electronic/technical. 

In the physical security world when you have a object, etc., that if lost would cause great harm and death you build layers of security, combinations of physical protections as well as electronic, that will deter attacks. For iSD, the gaol is to build and maintain layers that will cause the attacks to not penetrate the layers and access your valuable life. 

In the physical security world to protect high value and sensitive data and devices you combine; fences, Constantine wire, trenches, more fencing, fencing with electronic detection of heat, vibrations, etc., to trigger alarms of warning, armed guards that patrol. guard towers to observe and protect, locks that deter and slow down efforts to break and breach, ariel surveillance to detect airborne approaches, bollards, etc. to stop direct attacks by vehicles, etc., personal training to stop human social attacks, and so on. 

In the electronic-tech world of the matrix-like internet of one’s-n-zero’s we have to combine a human effort and intervention with software driven protections. It must be layered to make it safe and secure. Look at it as the following physical representation but assume the fencing, bollards, towers and trenches are actually cyber-defenses layered. 


Click for larger view.

No comments:

Post a Comment