CHAPTER

2   Cybersecurity Right-Think

Overview

•   2.1 It’s About Risk

•   2.2 The Cybersecurity Trade-off: Performance and Functionality

•   2.2.1 User-Friendliness

•   2.2.2 Time to Market

•   2.2.3 Employee Morale

•   2.2.4 Missed Opportunity

•   2.2.5 Opportunity Cost

•   2.2.6 Quantity of Service or Product

•   2.2.7 Quality of Service or Product

•   2.2.8 Cost of Service or Product

•   2.2.9 Limited Resources

•   2.3 Theories of Security Come from Theories of Insecurity

•   2.4 They Come at You Through the Weeds

•   2.5 Top-Down Meets Bottom-Up

•   2.6 Cybersecurity Is a Live Orchestra, Not a Recorded Instrument

Learning Objectives

•   Learn that the primary metric of cybersecurity is risk and its components.

•   Understand the trade-off ...

Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.