APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • News
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    right

    Attacks on Cyber Monster by Data-Driven Structure

    Apac CIOOutlook | Thursday, January 01, 1970
    Tweet

    Assuming the cyber threat to be a Godzilla, one can analyze and determine the need for a framework that can make the best use of limited resources. Suppose the monster attacks a corporate house, people such as architects or engineers present in the ground floor, would be scared of being stepped on by the monster’s feet. For system engineers who are assumed to be present on the first floor, would be worried not being kicked by the Godzilla. Likewise, the incident responders on the second floor can see the claws and feel threatened of the repercussions. People on higher floors, the operators, can see the shoulders and imagine the threat posed owing to the humongous size. And finally, the customers at the top can see the teeth and flames. All in all, people present in the building can best understand the threat the Godzilla poses when they see the monster from their own viewpoint. This concludes that the solution on any particular level is not necessarily the best possible outcome for the overall threat, where the best use of limited resources was made.

    While speaking during the AFCEA Defensive Cyber Operations Symposium, Patrick Arvidson, special Asst. to the Office of National Security Systems, National Security Agency (NSA), said that by comparing the cyber threat with a Godzilla is a way to show how different perspectives need to be incorporated into the structure. This can enable decisions to be made based on priorities and data. He also cited the example of falling of the Berlin Wall due to the incapability of Russians to modernize and win the situation and environment. He continued to say that, different US government agencies prioritize their challenges differently. Likewise, the challenges faced will be different within organizations in the same agency.

    “By relating cyber attacks with Godzilla, people need to understand a structure,” adds Arvidson. The top layer addressed the strategic objective of the opponent, which is to stay in, and then act. The next layer corresponds to the operational objective of the rival to be relentless and keep moving laterally. Likewise, the following layer is to identify the purpose of attack, like target location or wiping out a disk drive.

    Weekly Brief

    loading
    ON THE DECK
    Previous Next

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    The Role of Chatbots in Enhancing Customer Experiences and Strategic Insights for Marketers

    Environmental Monitoring with IoT in APAC

    Navigating Digital Document Management in the APAC Region

    Singapore's Strategic Investments in AI and HPC

    The Future of Digital Transformation in the APAC Region

    The Rise of Workflow Automation in APAC

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/attacks-on-cyber-monster-by-datadriven-structure-nwid-5377.html