In Chapter 8, Sunzi finally shifts the focus from “doing” to “knowing,” and begins to reveal the deep connections between CTI and InfoSec.
“Do not depend on the enemy not coming; depend rather on being ready for him. Do not depend on the enemy not attacking; depend rather on having a position that cannot be attacked.”
Chapter 6 – Weak Points and Strong Points – focuses on the methodological approach to war. The key takeaway is…
Part 3 of Rethinking CTI
Where the traditional warfare model ended in a failed analogy, the classical Chinese model offers a lot of potential value. Examination of five key points suggests that developing this model may prove very useful.
Part 2 of Rethinking CTI
Cyber-warfare and CTI are to traditional warfare what chess is to snakes and ladders: both play out on a grid, but that’s where the similarities end. By understanding the underlying problems behind the failed analogy, the requirements for the new system emerge.
Part 1 of Rethinking CTI
The traditional military warfare model is a common analogy to cyber-warfare and CTI. However, the analogy suffers from four fatal flaws, and is entirely incoherent.