"A Taxonomy of Operational Cyber Security Risks" by CMU's James J. Cebula and Lisa R. Young is a year-old paper that attempts to classify all the ways that technology go wrong, and the vulnerabilities than ensue. Fascinating reading, a great primer on technology and security, and as a bonus, there's a half-dozen science fiction/technothriller plots lurking on every page.
This report presents a taxonomy of operational cyber security risks that attempts to identify and
organize the sources of operational cyber security risk into four classes: (1) actions of people,
(2) systems and technology failures, (3) failed internal processes, and (4) external events. Each
class is broken down into subclasses, which are described by their elements. This report discusses
the harmonization of the taxonomy with other risk and security activities, particularly those de-
scribed by the Federal Information Security Management Act (FISMA), the National Institute of
Standards and Technology (NIST) Special Publications, and the CERT Operationally Critical
Threat, Asset, and Vulnerability Evaluation (OCTAVE) method.
A Taxonomy of Operational Cyber Security Risks (PDF)
My UK publisher, Head of Zeus, has published the official tour schedule for the British tour for Walkaway, with stops in Oxford (with Tim Harford), London (with Laurie Penny), Liverpool (with Chris Pak), Birmingham, and the Hay Literary Festival (with Dr Adam Rutherford). Hope to see you there!
My publicist just found an extra box of the cool promotional Walkaway multitools, and she’s generously offered to give them to the next 100 people to reserve tickets to the May 7th Walkaway event at Chicago’s Royal George Theater, where I’m presenting with CARDS AGAINST HUMANITY creator Max Temkin (current ticket-holders, don’t worry, you get […]
Carol from Cheapass Games writes, “In our continuing quest to bring back the very best classic Cheapass Games, we’re creating a new boxed set of Button Men, our strategy dice combat game. This time around, the characters will appear on cards, rather than pin-back buttons, but since they’re all 1950s era gangsters, the ‘button men’ […]
If you want to work in tech, but don’t have any desire to code web apps to help businesses sell things to other business, you might want to consider a career in cybersecurity. Judging from the apparent complete infiltration of Russian hackers in American cyberspace, it seems fair to speculate that there’s a major shortage of […]
All moms are different. But all moms like getting flowers on Mother’s Day, and that’s a fact (not, however a fact we can document in any fashion.) Instead of getting chewed out for forgetting to call her on the second Sunday of May, you can take care of it ahead of time with Teleflora’s flower […]
Yeah, Bluetooth audio is pretty common these days, so why should you care about these earbuds? Look how happy that woman up above looks. She’s got FRESHeBUDS in. Boom. There’s your reason. She’s also at the beach and it appears to be a very nice day.But for the sake of promotion, wireless earbuds are fast becoming the […]