SlideShare a Scribd company logo
1 of 28
Great Learning &
Information Security
how ancient Chinese Classic remains relevant
in modern information security
Chuan Lin, CISSP
Great Learning Background
Who Wrote it
• Zengzi, a disciple of Confucius,
wrote Great Learning.
What is it
• It is the first self-help book that
withstood the test of time and the
first Management as a Service
(MaaS) to others.
Great Learning Background II
When was it written
• It was written sometime between
445 – 436 BC during the Spring
and Autumn Period of Chinese
history when China was in a feudal
sovereignty that consisted of a
hundred city states which owed
loyalty to the Zhou Dynasty.
Where was it flourish?
• At the time it was written, Great
Learning was just another school
of thought that contended with
hundreds of other ideas. Later, it
became one of three main core
philosophies of China.
Great Learning Background III
Why is it matter?
• Its opening statement is no different than the mission statement from (ISC)2 and
SAN Code of Ethics.
• While the knowledge of 10 domains and technical information are necessary for the
information security professional, a person’s ethical standard is expected but not
much direction is given other than to follow various laws/ruling like HIPAA, SOX,
GLBA, Safe Harbor, etc.
• I believe Great Learning can be a useful guide for the Information Security
(InfoSec) Professional ethic.
Goals of Great Learning/InfoSec
What do we want to accomplish with our lives and our career?
“
”
大
學
之
道
,
在
明
明
德
,
在
親
民
,
在
止
於
至
善
。
The Dao of Great Learning is to illustrate illustrious virtues,
to renovate the people, and to rest in the highest excellence.
Safety of the commonwealth, duty to our principals, and to each other requires that we adhere,
and be seen to adhere, to the highest ethical standards of behavior.
- (ISC)2 Code of Ethics
The Dao of the Great Learning is to illustrate illustrious virtues, to
renovate the people, and to rest in the highest excellence.
GAIC Code of Ethic
• Respect for the Public
• Respect for the Certification
• Respect for my Employer
• Respect for Myself
SANS Code of Ethic
• I will strive to know myself and be
honest about my capability
• I will conduct my business in manner
that assures the IT profession is
considered one of integrity and
professionalism.
• I respect privacy and confidentiality.
7 Steps to Illustrating
Illustrious Virtues
Seeking Self Improvement First
“
”
知,止,定,靜,安,慮,得
knowing, ceasing, steadying, calming, quieting, pondering, obtaining
7 Steps of Acquiring Illustrious Virtues
How can these seven internal self improvement have an impact
on oneself and one’s InfoSec career in modern time?
知Knowing
Self Improvement
• In a corporate world, we are trained to exploit the
company’s strategic strengths while shoring up the
company’s weakness.
• In an engineering environment, we are trained to find
and rectify any product defects before they go to
market.
• Shouldn’t we train ourselves to find weakness within
ourselves before we or someone else initiates a zero-
day attack against us?
InfoSec Professional
• I have to know a company’s security status;
where are its strengths; where are its
weaknesses.
• I have to know the company's business goal, its
chain of command, its culture, its behaviors,
and its processes.
• I have to know their defenses-in-layers
structure, their logs control, their state of
readiness, their state of responsiveness, and etc.
止Ceasing
Self Improvement
• Ceasing is to prevent the breach of trust.
• To Cease one’s vices through gradual
reduction, redirect attention to healthier
alternatives, or going through cold turkey.
• To Cease through forming new habits,
rewarding for achieving milestones, and
attending support groups.
InfoSec Professional
• Ceasing is to prevent the breach of trust.
• To Cease internal risks through reduction,
mitigation, avoidance, or elimination.
• To Cease through log controls, separation
of duty, enforcement of least privilege,
secured software development lifecycle,
and make employees more security aware.
定Steadying
Self Improvement
• We know our strengths and
weaknesses.
• We curb our indulgences and capitalize
on our strengths.
• These will give us the confidence
against external pressures and attacks.
InfoSec Professional
• We know our company’s security
status.
• We have reduced our company’s risk
level.
• This will give us the confidence to
remain level headed when external
threats appear.
靜Calming
Self Improvement
• You’re only able to maintain
calmness after patching your flaws
because you don’t have to worry
about them been exploited.
• A peace of mind leads to a healthy
body.
InfoSec Profession
• Calming comes when the company
is safe from internal and external
threats.
• Calming allows the company to
plan its business strategy.
安Quieting
Self Improvement
• Quieting is the result of Calming.
While Quieting allows you to think
clearly, Calming allows you to act
without disruption.
• Quieting allows you to focus on the
task at hand without distraction.
InfoSec Profession
• The company that is secured and well
defended is free to focus on pursuing its
objectives.
• Security awareness has become a part of
the business culture or norm that
employees are able to sharpen their
security mindfulness without intruding or
interrupting to day-to-day work function.
慮Pondering
Self Improvement
• Without worry, without stress, you are
free to digest information to determine
how it improves your health, your
social/family life, and your career.
• You are able to plan ahead of where
you want to be in 6 months, 1 year, 5
years, or even 10 years.
InfoSec Profession
• Pondering allows a company to analyze its
business or marketing objectives, to review
its information technology, and to anticipate
future trends/threats.
• Previously in Ceasing and Steadying states,
the company is focused on managing
immediate risks. At Pondering, the company
now has the luxury to look ahead to
anticipate new risks and be prepared for
them.
得Obtaining
Self Improvement
• Peak virtuous state:
Stress free from fear of personal flaws
Have an actionable life plan
Achieving equilibrium of body and
mind
InfoSec Profession
• Peak security awareness state:
COBIT’s Optimizing Process
ITIL’s Optimized Maturity
Assessment Level
Security Awareness Roadmap: Metrics
Framework
Internal Sagacity,
External Sovereignty
How To Renovate People and Rest at Highest Excellence
Or How to Manage Self Before Managing Others
格物,致知,誠意,正心,脩身
Investigation of Things, Knowledge, Sincerity, Rectification, Self Cultivation
• Before managing others, first make
sure you have successfully managed
yourself.
• You must be able to withstand the
scrutiny of others.
• Your actions, your behaviors, and
your words will be constantly
observed and judged.
• This is especially true in the
age of Facebook, Twitter, and
Instagram where every little
transgression will be caught on
camera and spread like wildfire.
• There are people who love nothing
more than to tear down a public
figure.
格物Investigation of Things
Self Improvement
• …to know ten thousand things around you in
order to use them to help Heaven Below…
• Know your stuff outside your work
• All things have a beginning and an end.
• All things have patterns.
• All things have purpose whether you
realize it or not.
InfoSec Profession
• Information Security is about providing data
availability, confidentially, and integrity.
• Ideally, we like to get involved at the beginning of
all projects because of our concern for
information security.
• Externally, we need to know what regulations,
laws, and audits are required for this project.
• Internally, we need to know what our
administrative, technical, and physical constraints
are for this project.
致知Knowledge
Self Improvement
• Know who you are in relation with all things
around you
• Regardless of your status, you want to be
cherished, to be appreciated, and to be
respected.
• You will experience the march of time; you
are responsible for your actions.
• These things can’t be brought, or negated
with money, with power, or with fame.
InfoSec Profession
• We share our knowledge with key consultants,
managers, programmers, and other project
members.
• They need to take into account our information
security concerns in project designs.
• Any data leak will be a detriment to the
company image, reputation, confidence, and
not to mention, possible lawsuits.
誠意Sincerity
Self Improvement
• Sincerity is the best policy. This is a tried and true
cliché that has withstood the test of time.
• And in the age of information society, it is the
only policy.
• Why? Everything you’ve done is recorded, saved
for posterity, and can be accessible online. When
you apply to a highly prestigious, high paying,
and/or highly recognized position, you will be
scrutinized.
InfoSec Profession
• We show the sincerity of our concerns toward
data preservation through sharing our findings
with others and advocating security awareness.
• We will be tempted to speed up projects, or not to
put too many restrictions into current designs in
order to expedite the process, to move things
along, or to beat the deadlines.
• But then, we have to realize that the law of
consequences is at play here. Our involvement is a
series of tradeoffs of short term expedience vs.
long term data security.
正心Rectification
Self Improvement
• If you are sincere in your beliefs, then
your heart will be in the right place and
your actions will be proper.
• Why? Our actions result from our
thought process, whether conscious or
subconscious.
• And if you can’t be true to yourself,
then how can you be true to others?
InfoSec Profession
• No matter how many or whichever
elements our projects entail, our heart
has to be in the right place.
• Our heart lies in the credo that we
upheld upon joining (ISC)2 or GIAC.
• We must apply due diligence in our
involvement with all projects. Our
actions have to be as true as our words.
脩身Self Cultivation
Self Improvement
• Self-cultivation is about straightening the
heart.
• Those with anger, their hearts are
not straightened.
• Those with fear, their hearts are
not straightened.
• Those with desire, their hearts are not
straightened.
• Those with worry, their hearts are not
straightened.
InfoSec Profession
• While we ourselves strive to straighten our hearts,
we must watch out for employees who display:
• Anger
• Fear
• Desire
• Worry
• These have a higher probability of being a threat.
齊家 治國 平天下
Maintain Family, Regulate State (Company), Pacify Heaven Below (the Gird)
• The Great Learning is the first classic
on Management as a Service (MaaS).
• Only interested in self improvement?
Stop after Self Cultivation
• Interested in maintaining a household or a
department? Stop after Maintain Family
• Interested in running a government
agency or a company? Stop after
Regulate State
• Interested in doing the greater good, or
managing a multi-national corporation?
Continue to Pacify Heaven Below
• External Sovereignty is less about utilizing
the latest and greatest technology and
more about managing people.
• Social Engineering is the battle of hearts
and minds that can get passed through the
world’s most secured firewalls, IDS, IPS,
and defense in layers.
• Social Engineering is another term for spy,
grifter, scammer, con artist, and trojan
horse.
齊家Maintain Family
Self Improvement
• Maintaining a household comes about
after self-cultivation.
• You should avoid creating too much
• Favoritism
• Disapproval
• Fear
• A man who doesn’t know about his son’s flaw is
like a man doesn’t know about his crop’s health.
InfoSec Profession
• Maintaining a department comes about after
self-cultivation.
• It should be free from
• Favoritism
• Disapproval
• Fear
• As these will decrease employees security
awareness.
治國Regulate State (Company)
Self Improvement
• When a family acts humanely, the entire
nation promotes humaneness.
• When a family acts with deference, the
entire nation promotes civility.
• When a man is ruthless and corrupt, the
entire nation goes rogue.
• Hence, a word can instigate an incident; a
man can regulate a nation.
InfoSec Profession
• When a department behaves securely, the
entire company promotes vigilance.
• When a department limits its access, the
entire company promotes data control.
• When a man is ruthless and corrupt, the
entire company becomes vulnerable.
• Hence, a word can instigate a threat; a man
can secure a company.
平天下Pacify Heaven Below (the Gird)
Self Improvement
• A Gentleman practiced the Dao of Rules
& Regulation.
• Follow the Dao (of Great Learning), the
crowd and the nation follows. Lose the
Dao, lose the people, and lose the nation.
• Speak out contrarily; receive a contrary
response. Receive ill gotten wealth; out it
will flow with interest.
InfoSec Profession
• An InfoSec Professional lives and
breathes the Code of Ethic.
• Practice InfoSec, others engage and
company enacts. Disregard InfoSec,
others forget, and company neglects.
• Law of Consequence can be found in
personal, social, career, financial and
political aspects.
Great Learning & InfoSec Recaps
• As the first self-help book, it has withstood the test of time. As the first
book on MaaS (Management as a Service), it shows how to serve others by
first improving oneself.
• Instructions for management are no different than instructions for self
improvement. It is all about Lead by Example.
• Despite advanced technology, people’s heart and soul still remain the same.
They can enforce or enfeeble information security.

More Related Content

Similar to Great Learning & Information Security - English edition

Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
 
Intro to PS Workshop public July 2023.pptx
Intro to PS Workshop public July 2023.pptxIntro to PS Workshop public July 2023.pptx
Intro to PS Workshop public July 2023.pptxRichard McLean
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?Case IQ
 
How to Win - Managing Your Team
How to Win - Managing Your Team How to Win - Managing Your Team
How to Win - Managing Your Team Venture Advisors
 
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...kristinashields1
 
AITP Dallas Presentation - Ethics in Leadership
AITP Dallas Presentation - Ethics in LeadershipAITP Dallas Presentation - Ethics in Leadership
AITP Dallas Presentation - Ethics in LeadershipPaola Saibene
 
ANOH GAS PROJECT Developing a positive HSE culture.ppt
ANOH GAS PROJECT Developing a positive HSE culture.pptANOH GAS PROJECT Developing a positive HSE culture.ppt
ANOH GAS PROJECT Developing a positive HSE culture.pptolorunyomi wale
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Staffing Software Management Positions in a Development Office
Staffing Software Management Positions in a Development OfficeStaffing Software Management Positions in a Development Office
Staffing Software Management Positions in a Development Office4Good.org
 
7 Habits of Highly Effective People Training
7 Habits of Highly Effective People Training7 Habits of Highly Effective People Training
7 Habits of Highly Effective People TrainingJavier Juri
 
RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone Technologies
 
sdsc leadership training working
sdsc leadership training workingsdsc leadership training working
sdsc leadership training workingMike Kane
 
BASIC and COMMON COMPETENCIES POWER POINT.pptx
BASIC and COMMON COMPETENCIES POWER POINT.pptxBASIC and COMMON COMPETENCIES POWER POINT.pptx
BASIC and COMMON COMPETENCIES POWER POINT.pptxMarlouChesterBendao1
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?Kevin O'Connor
 
Crisis Of Training System.ppt
Crisis Of Training System.pptCrisis Of Training System.ppt
Crisis Of Training System.pptssuser855c8d
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderEvan Francen
 

Similar to Great Learning & Information Security - English edition (20)

Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)Cybersecurity is a Team Sport  (SecureWorld - Dallas 2018)
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
 
Intro to PS Workshop public July 2023.pptx
Intro to PS Workshop public July 2023.pptxIntro to PS Workshop public July 2023.pptx
Intro to PS Workshop public July 2023.pptx
 
What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?What is Psychological Safety in the Workplace?
What is Psychological Safety in the Workplace?
 
How to Win - Managing Your Team
How to Win - Managing Your Team How to Win - Managing Your Team
How to Win - Managing Your Team
 
Mapping the Mind
Mapping the MindMapping the Mind
Mapping the Mind
 
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...
Learning from Disaster - How a positive safety approach saves lives_MYOSH Web...
 
AITP Dallas Presentation - Ethics in Leadership
AITP Dallas Presentation - Ethics in LeadershipAITP Dallas Presentation - Ethics in Leadership
AITP Dallas Presentation - Ethics in Leadership
 
ANOH GAS PROJECT Developing a positive HSE culture.ppt
ANOH GAS PROJECT Developing a positive HSE culture.pptANOH GAS PROJECT Developing a positive HSE culture.ppt
ANOH GAS PROJECT Developing a positive HSE culture.ppt
 
Final project
Final projectFinal project
Final project
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Staffing Software Management Positions in a Development Office
Staffing Software Management Positions in a Development OfficeStaffing Software Management Positions in a Development Office
Staffing Software Management Positions in a Development Office
 
7 Habits of Highly Effective People Training
7 Habits of Highly Effective People Training7 Habits of Highly Effective People Training
7 Habits of Highly Effective People Training
 
RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
sdsc leadership training working
sdsc leadership training workingsdsc leadership training working
sdsc leadership training working
 
Roles And Responsibilities of HR
Roles And Responsibilities of HRRoles And Responsibilities of HR
Roles And Responsibilities of HR
 
BASIC and COMMON COMPETENCIES POWER POINT.pptx
BASIC and COMMON COMPETENCIES POWER POINT.pptxBASIC and COMMON COMPETENCIES POWER POINT.pptx
BASIC and COMMON COMPETENCIES POWER POINT.pptx
 
Social Psychology
Social PsychologySocial Psychology
Social Psychology
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?
 
Crisis Of Training System.ppt
Crisis Of Training System.pptCrisis Of Training System.ppt
Crisis Of Training System.ppt
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a Leader
 

More from Chuan Lin

大学与​信息安全​
大学与​信息安全​大学与​信息安全​
大学与​信息安全​Chuan Lin
 
黄帝内经与信安上部
黄帝内经与信安上部黄帝内经与信安上部
黄帝内经与信安上部Chuan Lin
 
黃帝內經與資安上部
黃帝內經與資安上部黃帝內經與資安上部
黃帝內經與資安上部Chuan Lin
 
Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Chuan Lin
 
Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Chuan Lin
 
项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & ChanChuan Lin
 
專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and ChanChuan Lin
 
PMP, InfoSec & Chan
PMP, InfoSec & ChanPMP, InfoSec & Chan
PMP, InfoSec & ChanChuan Lin
 
Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Chuan Lin
 
孙子项目管理法
孙子项目管理法孙子项目管理法
孙子项目管理法Chuan Lin
 
孫子專案管理
孫子專案管理孫子專案管理
孫子專案管理Chuan Lin
 
Sunzi's Art of PMP
Sunzi's Art of PMPSunzi's Art of PMP
Sunzi's Art of PMPChuan Lin
 
Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Chuan Lin
 
三十六社交工程计 上-简体
三十六社交工程计 上-简体三十六社交工程计 上-简体
三十六社交工程计 上-简体Chuan Lin
 
三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文Chuan Lin
 
Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Chuan Lin
 
Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Chuan Lin
 
Thirty-Six Stratagems of Social Engineering, Part I
Thirty-Six Stratagems of Social Engineering, Part IThirty-Six Stratagems of Social Engineering, Part I
Thirty-Six Stratagems of Social Engineering, Part IChuan Lin
 
易經與資安-中文
易經與資安-中文易經與資安-中文
易經與資安-中文Chuan Lin
 
圍棋和資安-中文版
圍棋和資安-中文版圍棋和資安-中文版
圍棋和資安-中文版Chuan Lin
 

More from Chuan Lin (20)

大学与​信息安全​
大学与​信息安全​大学与​信息安全​
大学与​信息安全​
 
黄帝内经与信安上部
黄帝内经与信安上部黄帝内经与信安上部
黄帝内经与信安上部
 
黃帝內經與資安上部
黃帝內經與資安上部黃帝內經與資安上部
黃帝內經與資安上部
 
Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1Yellow Emperor Internal Canon on Information Security - part 1
Yellow Emperor Internal Canon on Information Security - part 1
 
Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05Revisiting the Three Kingdoms, Issue 05
Revisiting the Three Kingdoms, Issue 05
 
项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan项目资安禅 - Project Management, Information Security & Chan
项目资安禅 - Project Management, Information Security & Chan
 
專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan專案、資安、禪 - PMP, InfoSec and Chan
專案、資安、禪 - PMP, InfoSec and Chan
 
PMP, InfoSec & Chan
PMP, InfoSec & ChanPMP, InfoSec & Chan
PMP, InfoSec & Chan
 
Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04Revisit the Three Kingdoms issue04
Revisit the Three Kingdoms issue04
 
孙子项目管理法
孙子项目管理法孙子项目管理法
孙子项目管理法
 
孫子專案管理
孫子專案管理孫子專案管理
孫子專案管理
 
Sunzi's Art of PMP
Sunzi's Art of PMPSunzi's Art of PMP
Sunzi's Art of PMP
 
Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03Revisit the Three Kingdoms 03
Revisit the Three Kingdoms 03
 
三十六社交工程计 上-简体
三十六社交工程计 上-简体三十六社交工程计 上-简体
三十六社交工程计 上-简体
 
三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文三十六社交工程計-上-繁體中文
三十六社交工程計-上-繁體中文
 
Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02Revisit the Three Kingdoms 02
Revisit the Three Kingdoms 02
 
Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1Romance of Three Kingdoms Vol1 Issue1
Romance of Three Kingdoms Vol1 Issue1
 
Thirty-Six Stratagems of Social Engineering, Part I
Thirty-Six Stratagems of Social Engineering, Part IThirty-Six Stratagems of Social Engineering, Part I
Thirty-Six Stratagems of Social Engineering, Part I
 
易經與資安-中文
易經與資安-中文易經與資安-中文
易經與資安-中文
 
圍棋和資安-中文版
圍棋和資安-中文版圍棋和資安-中文版
圍棋和資安-中文版
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Great Learning & Information Security - English edition

  • 1. Great Learning & Information Security how ancient Chinese Classic remains relevant in modern information security Chuan Lin, CISSP
  • 2. Great Learning Background Who Wrote it • Zengzi, a disciple of Confucius, wrote Great Learning. What is it • It is the first self-help book that withstood the test of time and the first Management as a Service (MaaS) to others.
  • 3. Great Learning Background II When was it written • It was written sometime between 445 – 436 BC during the Spring and Autumn Period of Chinese history when China was in a feudal sovereignty that consisted of a hundred city states which owed loyalty to the Zhou Dynasty. Where was it flourish? • At the time it was written, Great Learning was just another school of thought that contended with hundreds of other ideas. Later, it became one of three main core philosophies of China.
  • 4. Great Learning Background III Why is it matter? • Its opening statement is no different than the mission statement from (ISC)2 and SAN Code of Ethics. • While the knowledge of 10 domains and technical information are necessary for the information security professional, a person’s ethical standard is expected but not much direction is given other than to follow various laws/ruling like HIPAA, SOX, GLBA, Safe Harbor, etc. • I believe Great Learning can be a useful guide for the Information Security (InfoSec) Professional ethic.
  • 5. Goals of Great Learning/InfoSec What do we want to accomplish with our lives and our career?
  • 6. “ ” 大 學 之 道 , 在 明 明 德 , 在 親 民 , 在 止 於 至 善 。 The Dao of Great Learning is to illustrate illustrious virtues, to renovate the people, and to rest in the highest excellence. Safety of the commonwealth, duty to our principals, and to each other requires that we adhere, and be seen to adhere, to the highest ethical standards of behavior. - (ISC)2 Code of Ethics
  • 7. The Dao of the Great Learning is to illustrate illustrious virtues, to renovate the people, and to rest in the highest excellence. GAIC Code of Ethic • Respect for the Public • Respect for the Certification • Respect for my Employer • Respect for Myself SANS Code of Ethic • I will strive to know myself and be honest about my capability • I will conduct my business in manner that assures the IT profession is considered one of integrity and professionalism. • I respect privacy and confidentiality.
  • 8. 7 Steps to Illustrating Illustrious Virtues Seeking Self Improvement First
  • 9. “ ” 知,止,定,靜,安,慮,得 knowing, ceasing, steadying, calming, quieting, pondering, obtaining 7 Steps of Acquiring Illustrious Virtues How can these seven internal self improvement have an impact on oneself and one’s InfoSec career in modern time?
  • 10. 知Knowing Self Improvement • In a corporate world, we are trained to exploit the company’s strategic strengths while shoring up the company’s weakness. • In an engineering environment, we are trained to find and rectify any product defects before they go to market. • Shouldn’t we train ourselves to find weakness within ourselves before we or someone else initiates a zero- day attack against us? InfoSec Professional • I have to know a company’s security status; where are its strengths; where are its weaknesses. • I have to know the company's business goal, its chain of command, its culture, its behaviors, and its processes. • I have to know their defenses-in-layers structure, their logs control, their state of readiness, their state of responsiveness, and etc.
  • 11. 止Ceasing Self Improvement • Ceasing is to prevent the breach of trust. • To Cease one’s vices through gradual reduction, redirect attention to healthier alternatives, or going through cold turkey. • To Cease through forming new habits, rewarding for achieving milestones, and attending support groups. InfoSec Professional • Ceasing is to prevent the breach of trust. • To Cease internal risks through reduction, mitigation, avoidance, or elimination. • To Cease through log controls, separation of duty, enforcement of least privilege, secured software development lifecycle, and make employees more security aware.
  • 12. 定Steadying Self Improvement • We know our strengths and weaknesses. • We curb our indulgences and capitalize on our strengths. • These will give us the confidence against external pressures and attacks. InfoSec Professional • We know our company’s security status. • We have reduced our company’s risk level. • This will give us the confidence to remain level headed when external threats appear.
  • 13. 靜Calming Self Improvement • You’re only able to maintain calmness after patching your flaws because you don’t have to worry about them been exploited. • A peace of mind leads to a healthy body. InfoSec Profession • Calming comes when the company is safe from internal and external threats. • Calming allows the company to plan its business strategy.
  • 14. 安Quieting Self Improvement • Quieting is the result of Calming. While Quieting allows you to think clearly, Calming allows you to act without disruption. • Quieting allows you to focus on the task at hand without distraction. InfoSec Profession • The company that is secured and well defended is free to focus on pursuing its objectives. • Security awareness has become a part of the business culture or norm that employees are able to sharpen their security mindfulness without intruding or interrupting to day-to-day work function.
  • 15. 慮Pondering Self Improvement • Without worry, without stress, you are free to digest information to determine how it improves your health, your social/family life, and your career. • You are able to plan ahead of where you want to be in 6 months, 1 year, 5 years, or even 10 years. InfoSec Profession • Pondering allows a company to analyze its business or marketing objectives, to review its information technology, and to anticipate future trends/threats. • Previously in Ceasing and Steadying states, the company is focused on managing immediate risks. At Pondering, the company now has the luxury to look ahead to anticipate new risks and be prepared for them.
  • 16. 得Obtaining Self Improvement • Peak virtuous state: Stress free from fear of personal flaws Have an actionable life plan Achieving equilibrium of body and mind InfoSec Profession • Peak security awareness state: COBIT’s Optimizing Process ITIL’s Optimized Maturity Assessment Level Security Awareness Roadmap: Metrics Framework
  • 17. Internal Sagacity, External Sovereignty How To Renovate People and Rest at Highest Excellence Or How to Manage Self Before Managing Others
  • 18. 格物,致知,誠意,正心,脩身 Investigation of Things, Knowledge, Sincerity, Rectification, Self Cultivation • Before managing others, first make sure you have successfully managed yourself. • You must be able to withstand the scrutiny of others. • Your actions, your behaviors, and your words will be constantly observed and judged. • This is especially true in the age of Facebook, Twitter, and Instagram where every little transgression will be caught on camera and spread like wildfire. • There are people who love nothing more than to tear down a public figure.
  • 19. 格物Investigation of Things Self Improvement • …to know ten thousand things around you in order to use them to help Heaven Below… • Know your stuff outside your work • All things have a beginning and an end. • All things have patterns. • All things have purpose whether you realize it or not. InfoSec Profession • Information Security is about providing data availability, confidentially, and integrity. • Ideally, we like to get involved at the beginning of all projects because of our concern for information security. • Externally, we need to know what regulations, laws, and audits are required for this project. • Internally, we need to know what our administrative, technical, and physical constraints are for this project.
  • 20. 致知Knowledge Self Improvement • Know who you are in relation with all things around you • Regardless of your status, you want to be cherished, to be appreciated, and to be respected. • You will experience the march of time; you are responsible for your actions. • These things can’t be brought, or negated with money, with power, or with fame. InfoSec Profession • We share our knowledge with key consultants, managers, programmers, and other project members. • They need to take into account our information security concerns in project designs. • Any data leak will be a detriment to the company image, reputation, confidence, and not to mention, possible lawsuits.
  • 21. 誠意Sincerity Self Improvement • Sincerity is the best policy. This is a tried and true cliché that has withstood the test of time. • And in the age of information society, it is the only policy. • Why? Everything you’ve done is recorded, saved for posterity, and can be accessible online. When you apply to a highly prestigious, high paying, and/or highly recognized position, you will be scrutinized. InfoSec Profession • We show the sincerity of our concerns toward data preservation through sharing our findings with others and advocating security awareness. • We will be tempted to speed up projects, or not to put too many restrictions into current designs in order to expedite the process, to move things along, or to beat the deadlines. • But then, we have to realize that the law of consequences is at play here. Our involvement is a series of tradeoffs of short term expedience vs. long term data security.
  • 22. 正心Rectification Self Improvement • If you are sincere in your beliefs, then your heart will be in the right place and your actions will be proper. • Why? Our actions result from our thought process, whether conscious or subconscious. • And if you can’t be true to yourself, then how can you be true to others? InfoSec Profession • No matter how many or whichever elements our projects entail, our heart has to be in the right place. • Our heart lies in the credo that we upheld upon joining (ISC)2 or GIAC. • We must apply due diligence in our involvement with all projects. Our actions have to be as true as our words.
  • 23. 脩身Self Cultivation Self Improvement • Self-cultivation is about straightening the heart. • Those with anger, their hearts are not straightened. • Those with fear, their hearts are not straightened. • Those with desire, their hearts are not straightened. • Those with worry, their hearts are not straightened. InfoSec Profession • While we ourselves strive to straighten our hearts, we must watch out for employees who display: • Anger • Fear • Desire • Worry • These have a higher probability of being a threat.
  • 24. 齊家 治國 平天下 Maintain Family, Regulate State (Company), Pacify Heaven Below (the Gird) • The Great Learning is the first classic on Management as a Service (MaaS). • Only interested in self improvement? Stop after Self Cultivation • Interested in maintaining a household or a department? Stop after Maintain Family • Interested in running a government agency or a company? Stop after Regulate State • Interested in doing the greater good, or managing a multi-national corporation? Continue to Pacify Heaven Below • External Sovereignty is less about utilizing the latest and greatest technology and more about managing people. • Social Engineering is the battle of hearts and minds that can get passed through the world’s most secured firewalls, IDS, IPS, and defense in layers. • Social Engineering is another term for spy, grifter, scammer, con artist, and trojan horse.
  • 25. 齊家Maintain Family Self Improvement • Maintaining a household comes about after self-cultivation. • You should avoid creating too much • Favoritism • Disapproval • Fear • A man who doesn’t know about his son’s flaw is like a man doesn’t know about his crop’s health. InfoSec Profession • Maintaining a department comes about after self-cultivation. • It should be free from • Favoritism • Disapproval • Fear • As these will decrease employees security awareness.
  • 26. 治國Regulate State (Company) Self Improvement • When a family acts humanely, the entire nation promotes humaneness. • When a family acts with deference, the entire nation promotes civility. • When a man is ruthless and corrupt, the entire nation goes rogue. • Hence, a word can instigate an incident; a man can regulate a nation. InfoSec Profession • When a department behaves securely, the entire company promotes vigilance. • When a department limits its access, the entire company promotes data control. • When a man is ruthless and corrupt, the entire company becomes vulnerable. • Hence, a word can instigate a threat; a man can secure a company.
  • 27. 平天下Pacify Heaven Below (the Gird) Self Improvement • A Gentleman practiced the Dao of Rules & Regulation. • Follow the Dao (of Great Learning), the crowd and the nation follows. Lose the Dao, lose the people, and lose the nation. • Speak out contrarily; receive a contrary response. Receive ill gotten wealth; out it will flow with interest. InfoSec Profession • An InfoSec Professional lives and breathes the Code of Ethic. • Practice InfoSec, others engage and company enacts. Disregard InfoSec, others forget, and company neglects. • Law of Consequence can be found in personal, social, career, financial and political aspects.
  • 28. Great Learning & InfoSec Recaps • As the first self-help book, it has withstood the test of time. As the first book on MaaS (Management as a Service), it shows how to serve others by first improving oneself. • Instructions for management are no different than instructions for self improvement. It is all about Lead by Example. • Despite advanced technology, people’s heart and soul still remain the same. They can enforce or enfeeble information security.