The focus of Chapter 12, Incendiary attacks, may seem irrelevant in InfoSec, until we consider the role of the Podesta email and the DNC hacks.
Chapter 11 introduces the best attack strategies, which translates into the kinds of things the security apparatus must guard against.
Focusing on the intelligence and analysis, Chapter 10 again stresses proper use of knowledge as the crucial attribute of a commander.
Chapter 9 focuses on the role of skill over brute force, and the way of extracting that skill from one’s subordinates.
In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and InfoSec.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Sun Tzu advises that we should first make ourselves invincible, and then await enemy vulnerability. Does this idea work in the realm of Cyber Security?
In the first half of Chapter 3, Sunzi focused on the elements of engagement in, and waging of,war. This information…