116 Best Cybersecurity Tools & Tactics - RALFKAIROS
116 Best Cybersecurity Tools & Tactics - RALFKAIROS
116 Best Cybersecurity Tools & Tactics - RALFKAIROS
By Benjamin Eidam
Below are the best 116 tools and tactics to keep your business digitally secure.
1. Software
2. Hardware
3. Employees
4. Management
5. Company
6. Corporate culture
7. Suppliers
8. Environment
9. Artificial intelligence
10. Habits
benjamineidam.com 2
What is cybersecurity?
For most people, cybersecurity sounds quite abstract. Just as “security measures” can mean
anything and everything in the “real” world.
Cybersecurity is more than the sum of its parts. You can imagine cybersecurity as the "digital
immune system" like a sliced onion or a stack of Swiss cheese slices:
This e-book is about these layers, the components of cybersecurity. And about the most
practical and immediately applicable components of it. Because cybersecurity is such an
incredibly complex field that no side in the world can completely map it.
That is why I am showing 116 facets and immediately tangible possibilities that the big term
cybersecurity for every section will fill with life.
benjamineidam.com 3
Why is cybersecurity important?
Source: https://www.enisa.europa.eu/publications/year-in-review
Every company is attacked, no matter what size or sector, and this table is as impressive as
it is meticulous.
benjamineidam.com 4
The most common attack strategies:
● Attacks on the human element
● Web and browser-based attack vectors
● Internet Exposed objects
● Exploitation of weak points / misconfigurations and errors in cryptography / networks
/ security protocols
● Attacks via supply chain attacks
● Network spread / lateral movement
● Active network
● Abuse / escalation of privileges or userinformation
● Fileless or memory-based attacks
● Misinformation / disinformation
1. Double check and deal with the tool / tactic to evaluate which and which Shape
works best.
2. Consultation / questions to the relevant responsible. It's not about competencies or
paternalism, it's about optimal security. If he can say out of hand how this has already
been implemented, great. If not, this can be a good starting point for further security.
3. Each of these notes has been created to the best of our knowledge and belief,
however, successes in the individual application must be individually weighed and, if
necessary, supervised.
benjamineidam.com 5
Software
In principle, many of the cybersecurity options presented here are software.
And since the majority of cyber security takes place in cyberspace, software logically takes
up the largest part here.
In this section, however, I am mainly concerned with the “80/20” programs, i.e. the 20% of
cybersecurity software that as independently as possible of the occupation achieves 80% of
the security results for the user.
In other places I also give software recommendations, but these are section-specific.
benjamineidam.com 6
1. Secure password
For the foreseeable future, passwords will remain the most important security measure in the
digital space. While they can be supplemented and framed by other measures, they remain
# 1 on the list of defense strategies for now. But not all passwords are the same.
Source:
https://cloudnine.com/ediscoverydaily/electronic-discovery/how-long-will-it-take-to-crack-your
-password-cybersecurity-trends/
benjamineidam.com 7
Source: https : //imgur.com/t/nvidia/GpTYAg8 You can findgeneral information
2. Password manager
Since very few people can remember many different long character combinations,managers
are convenient, automatic and secure solutions for password safes or passwords. Examples
are KeePassX or 1Password.
benjamineidam.com 8
3. Passphrases
Passphrases are combinations of different words and characters to form memorable
“password sentences”.
benjamineidam.com 9
4. Password cards
Passwordcards convert passwords into sequences of steps. With a password card, you only
remember the starting point, the pattern (e.g. always one field diagonally downwards for
example) and the end point. Your password card will do the rest.
5. Password phrases
With password phrases you only memorize one key phrase and, for example, only enter the
first letters of each word in this phrase.
E.g .: I've lived at home alone since I was 10. = IlahsIw10b.
Password sentences are made even more effective by combining them with “Leetspeak”
(replacing letters with similar-looking digits and / or special characters).
Example: Wikipedia = w!K!P3d!4
6. Encryption Software
Encryption is useful for both data and hard disk drives. The best tool to start with is
Veracrypt.
benjamineidam.com 10
Download and further information about VeraCyrypt as well as image source:
https://www.heise.de/download/product/veracrypt-95747
7. Keyfiles
Keyfiles increase the security of tools password and encryption enormously. They are like a
key in addition to the password. But be careful: once lost or only corrupted by one bit, the
access files can never be restored and are irretrievably lost.
benjamineidam.com 11
8. Firewall
A firewall shields a computer from some types of external attacks. There are different types
of firewall and providers.
9. Antimalware
Malware is any malicious code that is intended to infect, infiltrate and destroy systems. On
the one hand, there is "classic" malware, i.e. malware written by humans. And on the other
hand "intelligent", i.e. reactive / adaptable malware. The latter is made possible by machine
learning and artificial intelligence.
● computer viruses,
● trojans,
● ransomware,
● keyloggers, etc.
10. OSINT
OSINT stands for Open Source Intelligence Tools, roughly translated as “publicly usable
information-collection tools”. These are mainly used by secret services, but are also used to
prepare for large-scale attacks. Knowing which data can be found out and how is an
enormous help in defending against social engineering attacks. You can find example tools
in my article on internet research or in this framework.
benjamineidam.com 12
Image source: own screenshot
benjamineidam.com 13
13. Security / penetration
Tools such as Kali Linux or Metasploit tests are pen test tools, “penetration test tools”, with
which systems can be attacked in order to find weak points in order to fix them. But be
warned: Depending on the country, some of the tools within these toolkits can be used
semi-illegally or even illegally. So check before you test please.
benjamineidam.com 14
Tool overview and image source:
https://www.talkwalker.com/de/blog/die-besten-sentiment-analyse-tools
benjamineidam.com 15
19. Use secure messengers
Especially in hacking and secret service circles one hears again and again that one should
generally avoid emails as best as possible. And use secure messengers instead. So
programs like WhatsApp, just in a safe way build. My personal favorite is Wire.
benjamineidam.com 16
Source: Own screenshot
benjamineidam.com 17
23. Shortlink Checker
Even if you can read links, shortlinks, i.e. services that turn long links into short,
easy-to-remember ones, such as bit.ly or similar services, effectively hide the actual link
source. If you click on the shortlink, however, it may already be too late. Shortlink reviewers
help by clicking the link and viewing the result from a safe distance. Similar to a virtual
system.
benjamineidam.com 18
Image source and further information:
https://www.heise.de/download/product/infosniper-ip-adressen-lokalisierung-55629
benjamineidam.com 19
28. Securing Wordpress
Since Wordpress hosts almost 65% of all websites, it makes sense to give a few short
recommendations for helpful tools for WP security.
benjamineidam.com 20
Hardware
Hardware is not as easy as attacking software and by far not as easy as manipulating a
person. Still, this is a popular vector to break into systems.
The minimum rule of thumb applies to hardware: The sender device, the receiver device and
the connection between the two devices must be secured.
For example, when surfing the Internet: the user's computer, the Internet connection and the
server of the website called up.
benjamineidam.com 21
1. Hardware firewall
A hardware firewall works very similarly to its software sister, but it can also provide
additional security.
With a hardware firewall, the device (the hardware) compares the various data streams and
makes it even more difficult for attackers to penetrate a system due to the fact that it is
different from software. Especially since an attack on the target computer, which can be
leveraged by a software firewall, does not affect the hardware firewall, as it is separated from
the computer. The AVM hardware firewall is a good starting point.
2. Hardware Key
Hardware keys are an excellent part of multi-factor authentication and make it extremely
difficult to break into a computer. These hardware keys, also called FIDO sticks, make it
difficult for anyone to get into the “apartment” (the target computer) without a key, just like a
classic house door. A good starting point is the Titan Security Key from Google.
Here is a list of other good hardware keys.
benjamineidam.com 22
3. Never save (YMYL) login data on (mobile) devices
YMYL stands for “Your Money Your Life” and describes all data that are related to your
money and your life / health. Securing access to this particularly sensitive data has top
priority. Therefore, if possible, no login data should be saved, especially on mobile, i.e. easily
movable devices.
The topics listed in the picture offer a good orientation as to which login data should not be
saved. Image source and further information about YMYL:
https://static.googleusercontent.com/media/guidelines.raterhub.com/en//searchqualityevaluat
orguidelines.pdf
benjamineidam.com 23
A fundamental alternative can be a “hardened device”, i.e. cyber-secure devices such as
crypto cell phones .
benjamineidam.com 24
Sweet but dangerous. Image source:
https://www.entertainmentearth.com/product/MC10375___16GB
9. WLAN Securing
A wireless network is no easy task. Because: Anyone with a device that can log into the
WLAN can in principle attack it.
Here are a few basic tips for WLAN security:
1. Activate (WPA2) encryption
2. Use a secure password for encryption, router and access (use different passwords
for each point)
3. all software Always keep up to date.
4. If possible, use cable instead of WiFi.
5. Deactivate file and printer sharing Deactivate
6. SSID broadcasting
benjamineidam.com 25
Image source and complete checklist:
https://security.utexas.edu/handheld-hardening-checklists/android
benjamineidam.com 26
Employees
In > 99% of the cases, humans are the greatest and simplest weak point of any system.
For this reason, many hackers no longer deal with technologies, because manipulating users
is almost always child's play in comparison.
benjamineidam.com 27
1. Secure your own brain / Amygdala hijacking
One of the most effective strategies in social engineering is to put the target in a strong
emotion such as fear or stress. This switches the target's brain from “complex thinking” to
“fight or flight” mode. The target of the attack can then hardly / no longer think abstractly and,
for example, carry out calculations but only react in a “quasi-panic” manner. From this
moment on you are literally the attacker's plaything.
And that doesn't happen in your mind. With this attack, your perception changes the “place
of residence” from the prefrontal cortex from your higher hemispheres to the amygdala, your
brain stem. Unprepared, you literally cannot do anything (meaningful) against an “amygdala
hostage-taking”.
An awareness of this possibility, standard protocols and strategies as well as stress tests
can help effectively. You can find more options here.
benjamineidam.com 28
3. No lethal data in public
A Lethal piece of data is any information which, if put into the wrong hands, can lead to
serious or even devastating damage. Depending on the situation, for example, passwords,
key cards, access codes, etc. A good rule of thumb is: “Would you feel comfortable
speaking to a group of people using a megaphone?" If this thought of it turns your
stomach upside down, make the phone call in the next room, think twice about writing down
your password, etc.
Vulnerability profiles can be a good starting point for security awareness. Image source and
further information: https://www.sicherheitskultur.at/social_engineering.htm
You can find a complete guide to phishing mails here, the same about phishing calls here,
more information about phishing, its types and much more here and a good quiz for
checking your own knowledge here.
benjamineidam.com 29
Anatomy of a phishing email. Image source and further information:
https://benjamineidam.com/phishing-mails
6. Identity Abuse
The abuse of digital identities is another asymmetrical attack method. Depending on the
scenario, the effort is almost negligible. The damage, however, can be gigantic. Job loss,
divorce, stress with the personal environment and high loss of money are the relatively
harmless effects. Suicide the worst.
The topic is very complex and has to be treated individually but two good starting points to
see at a glance whether you are in danger or your own sensitive data is already in the wrong
hands are these two pages:
● https://haveibeenpwned.com/
● https://sec.hpi.de/ilc/search?lang=de
benjamineidam.com 30
In addition to the “classic” identity abuse, there is also the “synthetic” identity theft / abuse.
With this, an artificial identity is made from one's own digital identity and thus damage is
caused.
7. Mental Models
Mental models are contextual perspectives on situations.
For example, a botanist sees a biological treasure in a forest and thinks about protection
strategies. An agricultural speculator, on the other hand, sees a monetary treasure in the
same forest and thinks about sales.
Mental models can be extremely effective in solving cybersecurity problems, especially
social engineering challenges.
benjamineidam.com 31
Expert-Interview: Sai Krishna
Founder of the Global Cybersecurity Forum
Sai on LinkedIn
1.What are the 3-5 biggest mistakes newcomers make when they start
cybersecurity?
- Influenced by the vendors, trainers and research papers
- Choosing a product from external recommendation, endorsement instead of looking at it
from his / her own use case
- Missing key success criteria during poc (Proof Of Concept)
benjamineidam.com 32
benjamineidam.com 33
Management
Managers, CEOs and bosses in various areas, groups and departments are a cybersecurity
category in themselves.
From a technical point of view, they are also people and employees, so they are just as
vulnerable.
In practice, however, it looks different: For people with responsibility and authorizations
within companies, there is a separate “universe of attack”
benjamineidam.com 34
1. Regular training / test
For people with responsibility, security clearance and access to sensitive information, the
tipps above apply even more for the management than for “the rest” of the workforce:
Hardening one's own behavior is very important for the cybersecurity of the entire company.
The 1½ approach works very well: Confident and routined action should either be ranked
first or, at most, second, depending on the activity. For YMYL areas in first place, for all
others to be decided individually. In other words: Before a bank manager can go about his
daily routine, he must first of all be cyber-secure. Otherwise, he simply cannot do his job
safely.
Rule of thumb: Use and edit YMYL data only behind closed doors, meaning in a secure
environment.
benjamineidam.com 35
3. The answer to the question "What can I do to protect the answer to 1.?" (For the
widest possible range of answers you have this page)
4. The answer to the question “Does it make sense to take further measures? And if so,
which ones? "
Here it almost always makes sense to look at and implement options and measures together
with a professional. e.g. via individual training and coaching.
Distinguishing a phishing mail from a mail is like distinguishing a flower from a bush. For
most people it is relatively easy and quick to do.
A whalephishing email, on the other hand, is like a blue flower to be distinguished from
another blue flower. Feasible if you have a little background in botany. Otherwise potentially
toxic.
You can find my guide on phishing mails here and on phishing calls here. For more
information about phishing, its species and more can be found here.
benjamineidam.com 36
Image source and further information:
https://www.wud.de/it-security/7-gefaehrliche-phishing-angriffsmlösungen-die-sie-kennen-mu
essen/
6. Identity abuse
As already mentioned above, identity abuse is an important part of cyber warfare. And
logically, an identity with more reputation, for example a manager, managing director or even
a celebrity, is a more worthwhile goal than a “normal” employee, right?
benjamineidam.com 37
When the big ones are hacked. Source:
https://twitter.com/tibor/status/1283502215039201282
7. Mental Models
As already mentioned above, the correct mental assessment, attitude and the resulting
options for action in the area of cybersecurity are essential for survival.
benjamineidam.com 38
benjamineidam.com 39
Companies
Companies are the main targets of cyber attacks because they are the main value-adding
company of the economy.
benjamineidam.com 40
1. Knowing and using security levels Controlling
Access sensibly can be a simple but asymmetrically effective security method. A good
starting point and / or balance it maythe the DIN-Standardization Roadmap.Designing these
together with all (relevant) employees can also the safety help culture.
The Traffic Light Protocol (TLP) levels of the Alliance for Cybersecurity are another good
framework for orienting your own security sections. Image source and further information:
https://www.allianz-fuer-cybersicherheit.de/Webs/ACS/DE/Home/_/merkblatt_verarbeitung_v
ertraulicher_informationen.html?nn=145680#download=1
benjamineidam.com 41
4. Knowing the vocabulary
The technical vocabulary list is endless and hopefully the most important words are already
covered here. When it comes to social engineering attacks, there are still a few key terms:
● DLP (Data Loss Prevention)
● UBA (User Based Analytics)
● SIEM (Security Information and Event Management)
● BRI (Business Risk Intelligence)
● IaaS (Infrastructure as a Service)
● PAM ( Privileged Accounts Management)
● XDR (eXtended Detection and Response)
● XSS (Cross-Site-Scripting)
Of course, this list does not claim to be complete. Rather, it can be viewed as a helpful,
conceptual addition and inspiration.
If you're looking for an instantly actionable 80/20 starting point, these three rules are likely to
be. Source of the 3 rules and more about them:
https://krebsonsecurity.com/2011/05/krebss-3-basic-rules-for-online-safety/
benjamineidam.com 42
Image source and further information on the BSI's cyber glossary:
https://www.bsi.bund.de/DE/Service-Navi/Cyber-Glossar/cyber-glossar_node.html
One possibility to secure your email addresses against bots: choose a different display
format.
benjamineidam.com 43
Captchas can be good hurdles against bots.
benjamineidam.com 44
11. Testing password strengths
Often referred to as “password auditing”. Cain & Abel and John the Ripper are the top
addresses for it.
benjamineidam.com 45
Image source and further information:
https://www.myrasecurity.com/de/was-ist-ein-ddos-angriff/
17. Injections
Injections, above all SQL injections, in short “SQLi's” are the misuse of programs by the
Smuggling in foreign code / commands. Injections have been at the top of the list for years
OWASP Top 10 Application Security Risks. You can find more about injections and
measures against them here.
benjamineidam.com 46
Corporate Culture
A "quasi-dictatorial leadership with a climate of fear" in a company is the dream scenario for
every attacker.
Long story short: Only if the company acts as a team, it is difficult for someone to drive a
wedge into it from the outside. Otherwise, it is child's play to play employees at any level off
against each other and manipulate them.
benjamineidam.com 47
1. Idea Meritocracy
An idea meritocracy describes the principle that the best idea always wins. No matter who it
comes from.
Thisby investor Ray Dalio and his company Bridgewater idea of idea meritocracy, coined
and lived, is also a cybersecurity measure. Because nonsensical and security-endangering
phenomena such as bullying, power games etc. are fundamentally defused. And esteemed
employees hold no grudges and are not ignorant of potential dangers.
From a cybersecurity perspective, a shitstorm is one of the easier scenarios that employees
can lead to. Image source and further information:
https://www.talkwalker.com/de/blog/krisenmanagement-wie-man-sich-auf-einen-shitstorm-vo
rready
Things like:
● decision fatigue (the more decisions made, the less energy for each further decision)
● tribal affiliation (humans are a group animal, which can be exploited)
● collective guilt (transfer of responsibility when performing an action)
● etc.
benjamineidam.com 48
Image source and further information: https://jamesclear.com/willpower-decision-fatigue
3. Extreme Ownership
Extreme Ownership means that every employee behaves as if he were the owner of the
company. It can roughly be translated as “extreme responsibility”. A company where this is
lived alone is much safer against social engineering etc. due to proactivity, self-evident and
mutual support, root cause control directly at the source etc.
benjamineidam.com 49
Expert-Interview: Kyle Lai
Kyle Lai is a Security Advisor, Investor and President, CISO & Head
of Services of KLC Consulting, Inc.
Kyle on LinkedIn
1. What are the 3-5 biggest mistakes newcomers make when they start
cybersecurity?
1) Start planning cybersecurity projects without understanding the company's
business and without involving business teams.
Different businesses have different attack vectors and threat actors. For example,
you need to protect the user's privacy, user identity, access, and transaction
integrity if you are in banking. If you are in the defense industry, your priority will be
protecting intellectual property, sensitive government information, supply chain
security, and manufacturing facilities. There are also regulations to comply with.
2) Communicate to business people without a common language.
Newcomers tend to use many technical terms with business people, which
degrades the relationships with business groups. New cybersecurity professionals
should learn to simplify the technical terms to a common language that business
people will understand. It is a better way to build trust and show that you are
helpful to them.
3) Not ask questions when getting stuck with a problem - Ask for help. People are
willing to help. The worst thing a professional can do is NOT ask questions when
getting stuck with a problem, then make up excuses on why they can't complete a
project.
benjamineidam.com 50
4) Enhance identity and access management. Remove unnecessary privileges after a
job transfer. Terminate accounts after job termination.
5) Get threat intelligence. The company should assign at least one security team
member to track daily security news for new vulnerabilities, new threats and
exploits, new emergency patches, etc.
benjamineidam.com 51
Suppliers
An often overlooked part of the safety chain is the “before” and “after”.
There is no point in the thickest fortress if the caravan from the neighboring village brings a
Trojan horse behind the walls.
benjamineidam.com 52
1. Security from start to finish / SSL
SSL certificates turn websites into “pipes” between sender and recipient that cannot be
looked into. So you secure the connection from one end to the other.
2. Interfaces / APIs
APIs, Application Programming Interfaces, are interfaces between your own software and
the software of other users, programmers or companies. To secure this is a high priority,
since the other side of the interface can not be controlled.
Example stations that must be secured all around. Image source and further information:
https://en.wikipedia.org/wiki/Supply_chain_attack
benjamineidam.com 53
benjamineidam.com 54
Environment
The environment and its effects are not adequately considered and taken into account in
almost all areas of life.
benjamineidam.com 55
1. Insert special glass
Your password can be read from your window: every click on a keyboard and every spoken
word generates a specific frequency. This frequency is picked up by some surfaces, e.g.
window panes, and generates a specific, measurable and interpretable vibration. These
speaking and typing vibrations can be collected and processed under the right
circumstances.
A good place to start when designing the decision architecture is “What was this space
designed for?“ You can find instructions and more information here.
benjamineidam.com 56
4. Understanding the depths of the Internet
Stolen data, accounts etc. very often end up in the Darknet and are sold there. Some data is
stolen from the deep web and then offered on the darknet.
But what are the dark and deep web anyway? In a nutshell:
● Darknet: Internet section that can only be accessed with special software. (TOR etc.)
● Deep Web: Internet sections to which no link leads. If you know the link, you have
access, otherwise the respective page is (theoretically) invisible.
The subject is very complex, but understanding these two key terms is already of great
benefit.
5. Mapping services
Programs such as Google Maps or Open Street Maps are extreme in everyday life
practically. But they can be used in the context of an OSINT analysis to find out targeted
attack routes. Here it makes sense to discuss possible measures with experts.
benjamineidam.com 57
6. Use “security corridors”
Especially in military and secret service systems there are sometimes “security corridors”.
These are corridors full of high-tech equipment such as deep retina scanners, gait analysis
tools, body heat scanners, etc. The aim of these corridors is to be able to identify the
respective person in real time and with almost 100% certainty. The idea: Everything that is
individual is suitable for identification. And the bigger the combination, the harder it is to
forge anything. (Apart from direct hacking of the software)your
You don't have to use it in your own company. But it is good to know the possibilities to make
decisions.
7. Security by Design
Security by Design is a holistic, i.e. holistic approach to the construction of software,
especially apps. The best starting point I know of is this free, which lasts just a few minutes
mini-course from Google.
benjamineidam.com 58
Expert-Interview: Cedric Mössner
Germany's most famous cybersecurity-teacher, computer scientist and
lecturer in Barcelona and Frankfurt.
Cedric on LinkedIn
1. What are the 3-5 biggest mistakes newbies make when starting out in
cybersecurity?
● When doing security, I think it's extremely important to set priorities. Because if you
are given a budget that is far too small, as usual, there is no point in dealing with a
secondary application in detail, but leaving the main application open to everything.
Of course, a higher budget would be nicer, but that's rarely the case.
● In addition, it is often noticeable that checks are only made once (if at all). That is
not enough, in the best case one has to search continuously.
● And that brings us to the third point: not from AI, but above all from humans. Tools
are nice and good and allow a quick automated check during build, but it cannot be
compared to a manual pentest, which should be done at least once a year.
benjamineidam.com 59
Artificial Intelligence
Artificial intelligence (AI) has been on everyone's lips and active in almost every device for
several years.
AI is probably the most important technology of this century and will accordingly
revolutionize cybersecurity more than once.
benjamineidam.com 60
1. Automated fraud detection
Artificial intelligence is getting better and better at detecting fraud, misappropriation and false
statements and acting accordingly. Regardless of whether it is phishing, credit card fraud,
forgery of ID cards, fake accounts, etc. AI can help with all of these and other areas. A good
start is this article.
benjamineidam.com 61
Image source and further information:
https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-mac
hine-learning-spoils-a-massive-dofoil-coin-mining-campaign /
benjamineidam.com 62
Image source and further information:
https://usmsystems.com/ai-ml-in-cybersecurity-use-cases-examples/
5. Vulnerability
Companies are faced with the challenge of managing and prioritizing the large number of
new vulnerabilities they encounter every day. Traditional vulnerability management
techniques only respond to incidents after hackers have exploited the vulnerability.
AI and machine learning techniques can enhance vulnerability databases and improve
vulnerability management. This can help protect companies even before vulnerabilities are
officially reported and patched.
benjamineidam.com 63
Finding out which data packets are dangerous and reacting in good time is one of the
greatest challenges of cybersecurity. Artificial intelligence can provide better and better
support here.
Companies like Esentire are increasingly specializing in these fields with AI.
7. E-mail monitoring
As already mentioned in the sections on phishing, the flow of conversations via e-mail is one
of the central sticking points of cybersecurity. Machine learning can support recognition to
increase speed and accuracy and to analyze texts via natural language processing. Coupled
with hardened employees, such an attack is then almost impossible.
8. Fighting bots
Automated threats can no longer be countered with manual measures alone. AI and
machine learning help build a thorough understanding of website traffic and differentiate
between good bots (like search engine crawlers), bad bots, and people.
AI enables the analysis of a huge amount of data and allows cybersecurity teams to adapt
their strategy to an ever-changing landscape.
Companies like Netacea are working on such services.
benjamineidam.com 64
Image source and further information: https://www.ponemon.org/
benjamineidam.com 65
Google's data centers are AI-optimized. Image source and further information:
https://www.wired.com/2012/10/ff-inside-google-data-center/
In the story of “sword against shield, burglar against defender”, in which the defender 's side
was always condemned to react, something changes for the first time.
13. AI sandboxes
As I mentioned above and go deeper in an article for Societybyte, “AI sandboxes” are
becoming more and more important.
Because only an intelligent simulated environment can keep up with intelligent, self-changing
algorithms.
benjamineidam.com 66
14. Reverse Blackbox
AI can also test intelligent algorithms and climb "backwards up the waterfall" to see if there
are any weak spots. If there is access to the attacker AI, its own AI can go backwards along
its layers of the neural network and thus decipher the attack algorithm. Based on this, it is
then easy to take countermeasures.
15. Identity
Artificial intelligence canfor example through Imagereverse image search, sentiment tools
such as assurance analysis virality maps prevent one's identity from being digitally misused,.
Regardless of whether it is classic, i.e. the “original identity”, or synthetic, in which real data
are mixed with artificial data in order to achieve a result.
This person does not exist and probably never will. Image source and further information:
https://thispersondoesnotexist.com/
benjamineidam.com 67
16. Cyber-Security
With the right algorithms and the right training data, it is possible to secure against physical
attacks in an automated way.
benjamineidam.com 68
Habits
Most non-technical cybersecurity tips and approaches have a sub-optimal starting point.
They assume that enough fear and / or understanding will automatically lead to the right
action.
But people are efficient. They always routinely do what is easiest, most energy efficient.
Because only security that has become routine is really security that earns this title.
benjamineidam.com 69
1. (Trained / Experience-based) Mindfulness & Skepticism
In the internet and digital space, the “Turkish bazaar” rule applies: In principle, mistrust the
entire experience and every interaction with another user.
The more potential value is in the room, the more the presumption of guilt should be
considered as “default mode”: someone wants to attack you or at least manipulate you until
the opposite is proven.
There are two ways to come to this kind of “experience awareness”:
● Years and decades of experience and learning from it.
● Work with experts.
benjamineidam.com 70
Important sidenote: The profiles should have as few common links as possible. So, for
example, share at most one anonymous mail address / disposable address independent of
your default one, etc.
Update speed using the example of the operating system. Image source and further
information:
https://www.drwindows.de/xf/threads/statistik-windows-10-version-20h2-l%C3%A4uft-jetzt-a
uf-jedem-f%C3%BCnften-pc.174662 /
5. Regular backups
As already mentioned several times, backups are very important. Because a defective data
cluster can destroy all of your work. Therefore, you would like to:
● Have regular (minimum 2x per year),
● happily automated,
● mirrored backups created and
● check them (at least randomly)
You can also outsource this process. However, as always, the rule of thumb applies: What
does not happen on your devices is insecure. It doesn't matter whether encrypted etc. or not
benjamineidam.com 71
6. Stay informed and adapt if necessary
Cyberspace is a world of its own, and in every world the rules of that world apply.
Therefore, it is of central importance to stay up-to-date on your own. Away from and in
addition to training courses, etc.
Because everyone has to deal with digital, networked technology all the time. Even if there
has just been no training.
Good active starting points in Germany are heise and Golem.
Good passive starting points can be tools like Google Alert for keywords like "cybersecurity"
or "hacking". Or individualized tools like search widgets or Google's Discover.
Of course, these rules do not always apply, but they are helpful guidelines.
benjamineidam.com 72
8. Living in a data-saving way
Since the Internet is a network of many computers with hard drives, the network literally
forgets nothing. Because every piece of information that exists is “somewhere on a hard
drive punched”.
In other words, the less data you generate, the more secure it is. Even counter-information is
only the second best strategy. (Just because it means more effort and is never 100% secure)
Same system, different profiles: One way of separating data streams. Image source and
further information:
https://blog.everphone.de/geschaeftliche-und-private-daten-trennen-smartphones
benjamineidam.com 73
10. Change preset passwords on new devices
As already mentioned in the sections on passwords, this measure is very simple and at the
same time very effective. With some devices, the passwords are always the same by
default. (e.g. place of manufacture, year of manufacture) This means that an attacker may
be able to enter passwords that have not been changed correctly on the first attempt.
benjamineidam.com 74
14. Avoiding / minimizing cyberbullying
This is one of the most difficult points of this basic guide. Basically, the rules of thumb and
rough recommendations apply:
● Live data-sparingly.
● Work with counter-information.
● Retain sovereignty over your digital identity.
● Be mindful of changes that may indicate hacks.
● Be skeptical.
● Use automated tools to notify you of updates about yourself.
benjamineidam.com 75
Image source and further information:
https://www.online-tech-tips.com/computer-tips/how-to-add-a-hidden-area-inside-an-encrypt
ed-veracrypt-volume/ Set
benjamineidam.com 76
FAQ
benjamineidam.com 77
About the Author
Benjamin Eidam is a consultant who secures
key employees of innovative companies
against hacker attacks and data theft
through security awareness coaching and
social engineering training.
Web:
benjamineidam.com
Mail:
[email protected]
LinkedIn:
https://www.linkedin.com/in/benjamin-eidam/
benjamineidam.com 78