The focus of Chapter 12, Incendiary attacks, may seem irrelevant in CS, until we consider the role of the Podesta email and the DNC hacks.
Chapter 11 introduces the best attack strategies, which translates into the kinds of things the security apparatus must guard against.
Focusing on the intelligence and analysis, Chapter 10 again stresses proper use of knowledge as the crucial attribute of a commander.
Chapter 9 focuses on the role of skill over brute force, and the way of extracting that skill from one’s subordinates.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and CS.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Chapter 7 – Armed Contest – is something of a psychological take on engaging in battle, and as such its…
Chapter 6 – Weak Points and Strong Points – focuses on the methodological approach to war. The key takeaway is…
Strategic advantage (shih) is the core of chapter 5. It is attained through leveraging information by proper knowledge.
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?
In the first half of Chapter 3, Sunzi focused on the elements of engagement in, and waging of,war. This information…