blog.jym.sgHow to add Google Analytics & submit Hashnode blog for indexing?Why bother? I wrote four entries related to Cyber Deception, submitted March 2021, yet none are found on Google with the exact title search. Instead, the Cyber-Observatory & Hackernoon versions (same titles & contents) came out on Google-search first...Mar 1, 2022·4 min read
blog.jym.sgA Systematic Approach to Cyber Deception (Part 4 of 4)Recap Part 1 introduced three phases of Cyber Deception Campaign & highlighted 4 considerations related to Industrial Networks: (1) Safety, (2) Availability, (3) Realism, & depending on our strategic goals, (4) Secrecy that we should be mindful thro...Apr 27, 2021·7 min read
blog.jym.sgA Systematic Approach to Cyber Deception (Part 3 of 4)Recap Part 2 of this series touched on planning & measuring success of a Cyber Deception campaign. It also covered some "estimations" of Threat Actors based on Operational Security abilities. This part will illustrate more examples of simulation vs d...Mar 23, 2021·5 min read
blog.jym.sgA Systematic Approach to Cyber Deception (Part 2 of 4)Recap Part 1 introduced 3 Phases of Cyber Deception Campaign. We briefly highlighted 4 considerations related to Industrial networks: (1) Safety, (2) Availability, (3) Realism, & depending on our strategic goals, (4) Secrecy that we should be mindfu...Mar 11, 2021·4 min read
blog.jym.sgA Systematic Approach to Cyber Deception (Part 1 of 4)Introduction This series is about Knowing ourselves, our enemy & plan in a way to conjure "grounds" & "weather" to our advantage. This approach is adapted from a joint-paper by Mohammed H. Almeshekah and Eugene H. Spafford, published by Springer ...Mar 9, 2021·2 min read