{"id":2176,"date":"2018-10-25T23:01:28","date_gmt":"2018-10-25T21:01:28","guid":{"rendered":"https:\/\/www.identitycosmos.com\/?p=2176"},"modified":"2018-10-25T23:01:28","modified_gmt":"2018-10-25T21:01:28","slug":"the-good-old-arcade-games-teach-us-about-today-cybersecurity-rules","status":"publish","type":"post","link":"https:\/\/identitycosmos.com\/index.php\/2018\/10\/25\/the-good-old-arcade-games-teach-us-about-today-cybersecurity-rules\/","title":{"rendered":"The good old Arcade Games teach us about today CyberSecurity rules"},"content":{"rendered":"<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA1.png\" alt=\"\" \/><\/p>\n<p>CyberSecurity is a never-end journey. The good old games are the same, old, always here and never outdated. As an old arcade games fanboy and an actual CyberSecurity &amp; IAM expert, it is amazing to see how the old rules serve the current war against malware, lack of systems configuration and black hats.<\/p>\n<p>Let&#8217;s review the rules and remember the happy days.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 1 with Space Invaders: hide yourself behind a wall is not enough for a good defense strategy<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA2.gif\" alt=\"\" \/><\/p>\n<p>In the Space Invaders game, you can stay behind the red wall, you will live for 5 minutes, but at the end you will die. Against the threats, is not enough to hide yourself and think the better days are coming. In an open world, you will need to build a defense strategy beyond an unique firewall strategy. The perimetric security is dead, you need to use other strategies. It doesn&#8217;t mean you don&#8217;t need a firewall or several, but you can&#8217;t think is enough to protect your network. Build a security data strategy, an encryption strategy, an authentication strategy and all the important strategies you need.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 2 with Donkey Kong: The lateral movement will provide privileges escalation for the attacker<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA3.jpg\" alt=\"\" \/><\/p>\n<p>In the Donkey Kong game, you will learn to do horizontal movement or vertical movement at the exact instant you need to. This is very true, especially when we are talking about Active Directory Hardening. The attacker will not try to catch the top-level system first, he will first try to compromise one workstation, and then he will try to go horizontal and get access to the other workstations. He will look for some high-level account privilege traces on the workstations. As soon he finds it, he is ready and now it is time to go vertical, climb the systems and go to the holly Graal, the Domain Controller of Active Directory.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 3 with Spy vs Spy: Using some HoneyPots is always a good strategy<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA4.jpg\" alt=\"\" \/><\/p>\n<p>In the Spy vs Spy game, the better way to defeat your adversary is to create and put some traps. When you want to detect the attacker, deploy some honeypots on your network will provide a good way to catch him. You can use honeypot in different manner: fake web site, fake DNS entries, fake admin accounts, etc. The only challenge will be to have a good understanding of the way the attacker acts to be sure you will put something interesting for him.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 4 with 1942: Agility and movement are key if you want to succeed against the enemy<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA5.png\" alt=\"\" \/><\/p>\n<p>In the 1942 game, if you stay at the same place on the screen you are dead after 2 seconds. When you are in movement, it is difficult to catch you. You need to constantly move and get agility to improve your faculty against the attacker. Don&#8217;t be static, change the configurations, change the passwords, change the different tools you are using to implement you defense. Evaluate new solutions, invent new defense \u2013 in one word, be Agile.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 5 with Double Dragon: Yes, you can beat a boss bigger than you<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA6.jpg\" alt=\"\" \/><\/p>\n<p>In the Double Dragon game, you will destroy a boss in every stage, each boss is bigger and more powerful than you. Even if the adversary seems to be huge: well-trained, large experience with good technical skills, you can beat it. It is matter for anticipation, pugnacity and strategy. You can defeat the beast, but you need to study the beast strategy, learn the way he moves, learn the way he acts, learn his characteristics and you will be able to succeed.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 6 with Sorcery: Each system owns a specific weakness<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA7.jpg\" alt=\"\" \/><\/p>\n<p>In the Sorcery game, each object will kill a specific creature: The Strong Sword kills the monks, the Sharp Axe kills the ghosts, the ball &amp; chain kills the Beholder, etc. Sometimes you are not responsible of the system or application choice, but you need to protect it. Here it is difficult, because you are not a specialist on every system, but you will need to study and learn about the different key weakness for each: Windows, Linux, Oracle, Tomcat, etc. have specific issues or weakness -So you will need to train yourself, speak with other specialist and define the correct strategy for each system. It is hard, time consuming but you will get a basic understanding on all the platforms you need to protect.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 7 with Ghosts&#8217;N Goblins: Practice, practice and again practice<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA8.png\" alt=\"\" \/><\/p>\n<p>In the Ghosts&#8217;N Goblins game, the first 50 times you will play the game, you will die very quickly, after a while you will start to succeed in the game. You need to train &amp; practice \u2013 again, train &amp; practice \u2013 again, train &amp; practice \u2013 etc. As you understand, this is again a never end story, you always have new technologies, new type of attack, new discovered vulnerability \u2013 the only way to make a good job for you in terms of security is practice and practice again. Your self-training capabilities will be key in your success. Again it is time consuming, but you will get a very good ROI from your tests and labs.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 8 with Golden Axe: Different people, different skills, you need to build a strong team for defense<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA9.png\" alt=\"\" \/><\/p>\n<p>In the Golden Axe game, you must use different type of characters which have different skills considering the situation and your enemy. You can&#8217;t perform everything by yourself, you can&#8217;t be a top specialist on every technology or system. So, you need a team, a strong defend team with various people who have different technology knowledges. With a good mix of folks, which complete each other, you be able to succeed against the threat.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 9 with OutRun: Speed is your best friend and speed is your best enemy<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA10.png\" alt=\"\" \/><\/p>\n<p>In the OutRun game, if you go too slow you will lose the race, if you go too fast, you will break your car in a wall. For sure, when you are under attack, you will need to react very fast to get the systems back and be safe again \u2013 BUT \u2013 sometimes if you react too fast you will make the wrong choices, in fact you need to find the good tempo. You are under attack ? take a good breathe, a strong coffee, a fine whisky and think about it, you will need to investigate the situation before to react and find the prefect planning to fix the breach. Be fast, don&#8217;t be too fast.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Rule 10 with Tetris: Build your own pattern<br \/>\n<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA11.png\" alt=\"\" \/><\/p>\n<p>Tetris is my FAVORITE game. I played during hours, days, weeks, months when I was younger. The very important teaching with Tetris is you will have different way to win the game. Depending your personality, you will play a different way. It is not existing a good or a bad way to play, the good way is only the way which permits you to win the game. It will be the same with your defense strategy, depending who you are, depending your skills or your personality, you will elaborate a different strategy. Know your systems, know yourself and build your own pattern.<\/p>\n<p><span style=\"text-decoration: underline;\">Remember the rules:<br \/>\n<\/span><\/p>\n<p>Rule 1 with Space Invaders: hide yourself behind a wall is not enough for a good defense strategy<\/p>\n<p>Rule 2 with Donkey Kong: The lateral movement will provide privileges escalation for the attacker<\/p>\n<p>Rule 3 with Spy vs Spy: Using some Honey Pot is always a good strategy<\/p>\n<p>Rule 4 with 1942: Agility and movement are key if you want to succeed against the enemy<\/p>\n<p>Rule 5 with Double Dragon: Yes, you can beat a boss bigger than you<\/p>\n<p>Rule 6 with Sorcery: Each system owns a specific weakness<\/p>\n<p>Rule 7 with Ghosts&#8217;N Goblins: Practice, practice and again practice<\/p>\n<p>Rule 8 with Golden Axe: Different people, different skills, you need to build a strong team for defense<\/p>\n<p>Rule 9 with OutRun: Speed is your best friend and speed is your best enemy<\/p>\n<p>Rule 10 with Tetris: Build your own pattern<\/p>\n<p>, and thanks to the old arcade games !<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" src=\"http:\/\/identitycosmos.com\/wp-content\/uploads\/2018\/10\/102518_2059_ThegoodoldA12.jpg\" alt=\"\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CyberSecurity is a never-end journey. The good old games are the same, old, always here and never outdated. As an old arcade games fanboy and an actual CyberSecurity &amp; IAM expert, it is amazing to see how the old rules serve the current war against malware, lack of systems configuration and black hats. Let&#8217;s review [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[33,78,97],"class_list":["post-2176","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-non-classe","tag-arcade","tag-cybersecurity","tag-game"],"_links":{"self":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/comments?post=2176"}],"version-history":[{"count":0,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/posts\/2176\/revisions"}],"wp:attachment":[{"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/media?parent=2176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/categories?post=2176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/identitycosmos.com\/index.php\/wp-json\/wp\/v2\/tags?post=2176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}