Categories
Wisdom

OUR CYBER-WISDOM: Cybersecurity, Evaluating Our Own Situation

How can we protect ourselves online? How do we ensure our data is secured and only trusted parties gain access? Unfortunately, there is no easy answer and there is nothing that is 100% foolproof, but there are actions we can take to protect ourselves.

Chapter 2: I.C.E. Part One (11.11.20)

Inspired in combination from BCB Cyber Studies on the Subject and by dummies’ A Wiley Brand Cybersecurity that can be purchased here (#Commissions Earned).

In William Gibson’s novels Burning Chrome and Neuromancer (#CommissionsEarned), he introduced us to a “technology” known as Intrusion Countermeasures Electronics (ICE). ICE, itself, refers to “security programs which protect computerized data from being accessed by hackers.”

While we may not have the ICE yet as envisioned in Neuromancer, there are actions we can take to build our own version. It is incumbent upon us to take action and protect ourselves as individuals. The elements depicted above help to illustrate the various elements we each can add to our home networks and environments to help protect ourselves. For BCB Cyber, the only illustrates the first building block on our cybersecurity journey. Over time, we’ll be adding much more and diving into the details on how these various elements can be achieved and so much more.

Make sure to come back often. For more Cyber-Fuel on Wisdom, please check out our dedicated section on the subject.