APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Attacks on Cyber Monster by Data-Driven Structure

    Assuming the cyber threat to be a Godzilla, one can analyze and determine the need for a framework that can make the best use of limited resources.  

    Attacks on Cyber Monster by Data-Driven Structure

    By

    Apac CIOOutlook | Thursday, January 01, 1970

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    Assuming the cyber threat to be a Godzilla, one can analyze and determine the need for a framework that can make the best use of limited resources. Suppose the monster attacks a corporate house, people such as architects or engineers present in the ground floor, would be scared of being stepped on by the monster’s feet. For system engineers who are assumed to be present on the first floor, would be worried not being kicked by the Godzilla. Likewise, the incident responders on the second floor can see the claws and feel threatened of the repercussions. People on higher floors, the operators, can see the shoulders and imagine the threat posed owing to the humongous size. And finally, the customers at the top can see the teeth and flames. All in all, people present in the building can best understand the threat the Godzilla poses when they see the monster from their own viewpoint. This concludes that the solution on any particular level is not necessarily the best possible outcome for the overall threat, where the best use of limited resources was made.

    While speaking during the AFCEA Defensive Cyber Operations Symposium, Patrick Arvidson, special Asst. to the Office of National Security Systems, National Security Agency (NSA), said that by comparing the cyber threat with a Godzilla is a way to show how different perspectives need to be incorporated into the structure. This can enable decisions to be made based on priorities and data. He also cited the example of falling of the Berlin Wall due to the incapability of Russians to modernize and win the situation and environment. He continued to say that, different US government agencies prioritize their challenges differently. Likewise, the challenges faced will be different within organizations in the same agency.

    “By relating cyber attacks with Godzilla, people need to understand a structure,” adds Arvidson. The top layer addressed the strategic objective of the opponent, which is to stay in, and then act. The next layer corresponds to the operational objective of the rival to be relentless and keep moving laterally. Likewise, the following layer is to identify the purpose of attack, like target location or wiping out a disk drive.

    More in News

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Influence of AI on Supply Chain Management

    Influence of AI on Supply Chain Management

    Role of Blockchain in Fostering a Trust-Based Economy

    Role of Blockchain in Fostering a Trust-Based Economy

    Revolutionizing Healthcare Through 5G Technology

    Revolutionizing Healthcare Through 5G Technology

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/attacks-on-cyber-monster-by-datadriven-structure-nwid-5377.html