Things I write on this blog are:
Technology | Politics | Cyber security | Strategy & warfare
Cyber security is all over the news and it’s here to stay. Learning more about cyber security can look like a daunting task. This has to do with many different reasons. However, I think one the main reason relates to the problem of definition.
A commonly used definition of cyber security will look something like: “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”
Or: “Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.”
These definitions are to me too narrow. Therefore, I look more towards definitions used by academic institutions such as: “computing-based discipline involving technology, people, information, and processes to enable assured operations. It involves the creation, operation, analysis, and testing of secure computer systems. It is an interdisciplinary course of study, including aspects of law, policy, human factors, ethics, and risk management in the context of adversaries.”
By accepting a broader definition like this, it does not become easier to fully understand cyber security (I think no one can) but I do believe it can provide a deeper appreciation for the issues and solutions that we as individuals and a society have to face.
Then, by first zooming out and look at cyber security from a broad as possible perspective one can zoom in and narrow down the focus on a particular issue and solution.
As a political scientist and military strategic scholar, my personal interest for cyber security was triggered by an increasing knowledge and understanding about cyber security and how it was going to affect national security, politics and international relations. I was narrowing down my focus on this particular area of cyber security. However, by zooming out, I quickly realized that I had much more to learn in different areas such a cryptography, hardware security, network security, security engineering, and programming. Furthermore, I needed to get my hands dirty and start learning how to use the command line, Kali Linux, configuring Raspberry Pi’s and soldering.
This blog will contain bits and bytes of random thoughts, blogs, articles, references to other interesting material in order for me to keep track of my development and motivation to keep learning cool new exciting stuff.