<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>udemy on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/udemy/</link><description>Recent content in udemy on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 27 Dec 2020 20:59:11 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/udemy/index.xml" rel="self" type="application/rss+xml"/><item><title>December Check-in</title><link>https://ahessmat.netlify.com/post/2020-12-december-check-in/</link><pubDate>Sun, 27 Dec 2020 20:59:11 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2020-12-december-check-in/</guid><description>Preamble This month there is a variety of interesting cyber subjects that caught my eyes and ears:
You&amp;rsquo;ll See This Message When It&amp;rsquo;s Too Late
I started listening to this audiobook by Josephine Wolff this month. The book describes a series of significant cybersecurity incidents from 2005 to 2015, outlining the underlying motives as well as how their targets reacted. Wolff argues early on that there are a multitude of agents that can - in a limited fashion - contribute to a target&amp;rsquo;s defense: politicians/CEOs are responsible for enacting policy, ISPs are responsible for trafficking information between networks, network engineers are responsible for crafting robust networks, developers are responsible for creating/updating secure products, and of course users are responsible for their own individual behavior.</description></item></channel></rss>