<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[christoskoziaris.com]]></title><description><![CDATA[Information Security, Privacy and the Art of Living  and Making Business Taking Risks. Thoughts, stories and ideas for inspiration.]]></description><link>https://christoskoziaris.com/</link><image><url>https://christoskoziaris.com/favicon.png</url><title>christoskoziaris.com</title><link>https://christoskoziaris.com/</link></image><generator>Ghost 5.75</generator><lastBuildDate>Tue, 10 Mar 2026 16:24:29 GMT</lastBuildDate><atom:link href="https://christoskoziaris.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Tails: A Bastion of Privacy and Security in the Digital Age]]></title><description><![CDATA[<p></p><p>In today&apos;s interconnected world, where personal data is a highly sought-after commodity, securing privacy and anonymity online has become paramount. Enter <a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> OS, a security-focused Debian-based Linux distribution designed to shield users from prying eyes and safeguard their digital footprint.</p><p>Tails stands for &quot;The Amnesic Incognito Live</p>]]></description><link>https://christoskoziaris.com/tails_a_bastion_of_privacy_and_security_in_the_digital_age/</link><guid isPermaLink="false">65b542cced7f9600017d60d8</guid><category><![CDATA[Privacy]]></category><category><![CDATA[InfoSec Tools]]></category><category><![CDATA[OS]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Mon, 29 Jan 2024 06:00:18 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1640552435388-a54879e72b28?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fERlYmlhbnxlbnwwfHx8fDE3MDYzNzgxODJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1640552435388-a54879e72b28?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fERlYmlhbnxlbnwwfHx8fDE3MDYzNzgxODJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Tails: A Bastion of Privacy and Security in the Digital Age"><p></p><p>In today&apos;s interconnected world, where personal data is a highly sought-after commodity, securing privacy and anonymity online has become paramount. Enter <a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> OS, a security-focused Debian-based Linux distribution designed to shield users from prying eyes and safeguard their digital footprint.</p><p>Tails stands for &quot;The Amnesic Incognito Live System,&quot; aptly capturing its core principles of amnesia and security. This operating system operates entirely from a USB drive or DVD, leaving no trace on your hard drive when shut down. This effectively erases any evidence of your online activities, ensuring that your privacy remains protected.</p><p><strong>Encryption and Tor: The Cornerstones of Tails&apos; Security</strong></p><p><a href="https://tails.net/?ref=christoskoziaris.com">Tails</a>&apos; primary defense against surveillance and tracking is Tor, a free and open-source anonymization network that encrypts internet traffic and routes it through a series of relays, making it virtually impossible for anyone to trace your online activities back to you.</p><p>This combination of encryption and Tor&apos;s decentralized network renders Tails a formidable tool for protecting your privacy. Even if someone manages to capture your internet traffic, they would be unable to decipher it or identify your real-world identity.</p><p><strong>Tailored for Temporary Use: A Temporary Privacy Sanctuary</strong></p><p><a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> is designed for temporary use, leaving no trace of your activities upon shutdown. This ephemeral nature ensures that your privacy remains protected, even if you use Tails on a shared or public computer.</p><p>When you power off Tails, all downloaded data, cookies, and temporary files are automatically deleted, leaving behind a clean slate. This amnesiac feature is crucial for safeguarding sensitive information and maintaining your privacy.</p><p><strong>A Comprehensive Suite of Security Tools</strong></p><p><a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> goes beyond Tor and encryption, providing a comprehensive suite of security tools to further enhance your online safety. These include:</p><ol><li><strong>Tor Browser:</strong> A customized version of Tor Browser specifically optimized for Tails, offering enhanced privacy and security when browsing the internet.</li><li><strong>Thunderbird:</strong> A secure email client that enables encrypted communication and protects your personal data from interception.</li><li><strong>KeePassXC:</strong> A powerful password manager that securely stores and manages your passwords, preventing unauthorized access to your online accounts.</li></ol><p><strong>Tails: A Valuable Ally for Privacy-Conscious Individuals</strong></p><p><a href="https://tails.net/?ref=christoskoziaris.com"><strong>Tails</strong></a> OS serves as a valuable ally for individuals seeking to protect their privacy and anonymity online. Its combination of security features, encryption, and ephemeral nature makes it an ideal tool for activists, journalists, and others who need to safeguard their digital activities.</p><p>Whether you&apos;re concerned about government surveillance, online censorship, or simply want to maintain a higher level of privacy in your online life, Tails OS offers a robust and effective solution. By embracing Tails, you can take back control of your digital footprint and safeguard your personal information.</p><p><strong>Tails</strong>, also known as The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution designed to preserve Internet privacy and anonymity. It connects to the Internet exclusively through the anonymity network Tor.</p><figure class="kg-card kg-image-card"><img src="https://christoskoziaris.com/content/images/2024/01/TAILS_5.18_desktop_with_Tor_Browser.png" class="kg-image" alt="Tails: A Bastion of Privacy and Security in the Digital Age" loading="lazy" width="1680" height="1050" srcset="https://christoskoziaris.com/content/images/size/w600/2024/01/TAILS_5.18_desktop_with_Tor_Browser.png 600w, https://christoskoziaris.com/content/images/size/w1000/2024/01/TAILS_5.18_desktop_with_Tor_Browser.png 1000w, https://christoskoziaris.com/content/images/size/w1600/2024/01/TAILS_5.18_desktop_with_Tor_Browser.png 1600w, https://christoskoziaris.com/content/images/2024/01/TAILS_5.18_desktop_with_Tor_Browser.png 1680w" sizes="(min-width: 720px) 720px"></figure><p><strong>Key Features of </strong><a href="https://tails.net/?ref=christoskoziaris.com"><strong>Tails</strong></a><strong> OS:</strong></p><ol><li><strong>Privacy and Anonymity:</strong> Tails is designed to protect your privacy and anonymity by preventing tracking and surveillance. It does this by using Tor to encrypt your internet traffic and by never writing anything to your hard drive, leaving no trace of your activities.</li><li><strong>Portability:</strong> Tails is designed to be run from a USB drive or DVD, so you can take it with you and use it on any computer. This makes it ideal for situations where you need to be extra careful about your privacy, such as when using public computers.</li><li><strong>Built-in Security Tools:</strong> Tails includes a variety of security tools, such as Tor Browser, Thunderbird for encrypted email, and KeePassXC for password management. These tools make it easy to protect your data and communicate securely.</li><li><strong>Amnesia:</strong> Tails is designed to be used for temporary activities. When you shut down Tails, all of your data is automatically deleted. This means that there is no risk of your personal information being leaked.</li></ol><p><strong>Who Uses </strong><a href="https://tails.net/?ref=christoskoziaris.com"><strong>Tails</strong></a><strong> OS:</strong></p><ul><li><strong>Activists:</strong> Tails is used by activists to hide their identities, avoid censorship, and communicate securely.</li><li><strong>Journalists:</strong> Journalists and their sources use Tails to publish sensitive information and access the internet from unsafe places.</li><li><strong>Domestic violence survivors:</strong> Domestic violence survivors use Tails to escape surveillance at home.</li></ul><p><strong>How to Use </strong><a href="https://tails.net/?ref=christoskoziaris.com"><strong>Tails</strong></a><strong> OS:</strong></p><p>To use Tails, you will need to download a Tails image and burn it to a USB drive or DVD. Once you have done this, you can boot your computer from the Tails drive. Tails will automatically start up and connect to the Tor network.</p><p>You can then use Tails to browse the internet, send and receive email, and communicate with others securely. When you are finished using Tails, simply shut down the computer.</p><p><a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> OS is a powerful tool that can be used to protect your privacy and anonymity online. If you are concerned about your online security, I encourage you to learn more about <a href="https://tails.net/?ref=christoskoziaris.com">Tails</a> and consider using it.</p>]]></content:encoded></item><item><title><![CDATA[What is DFIR?]]></title><description><![CDATA[<p>DFIR stands for <strong>Digital Forensics and Incident Response</strong>. It is a specialized field that focuses on identifying, investigating, and remediating cybersecurity incidents. DFIR combines two key areas of expertise:</p><p><strong>1. Digital Forensics:</strong> This involves collecting, preserving, and analyzing digital evidence. Forensic investigators examine various types of digital data, such as</p>]]></description><link>https://christoskoziaris.com/what_is_dfir/</link><guid isPermaLink="false">65b52688ed7f9600017d60b9</guid><category><![CDATA[DFIR]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Sat, 27 Jan 2024 15:53:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fERpZ2l0YWwlMjB8ZW58MHx8fHwxNzA2MzcxMTQxfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1555949963-ff9fe0c870eb?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDN8fERpZ2l0YWwlMjB8ZW58MHx8fHwxNzA2MzcxMTQxfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="What is DFIR?"><p>DFIR stands for <strong>Digital Forensics and Incident Response</strong>. It is a specialized field that focuses on identifying, investigating, and remediating cybersecurity incidents. DFIR combines two key areas of expertise:</p><p><strong>1. Digital Forensics:</strong> This involves collecting, preserving, and analyzing digital evidence. Forensic investigators examine various types of digital data, such as computer systems, mobile devices, network logs, and social media platforms, to reconstruct the events leading up to and during a cybersecurity incident. They use specialized tools and techniques to identify, extract, and examine digital evidence without altering or compromising its integrity.</p><p><strong>2. Incident Response:</strong> This refers to the process of responding to and managing a cybersecurity incident. Incident response teams work to contain the incident, identify the root cause, and restore normal operations. They also take steps to prevent future incidents from occurring.</p><p>DFIR specialists play a critical role in protecting organizations from cyberattacks. By investigating the source of incidents and identifying vulnerabilities, they help organizations to strengthen their cybersecurity posture and minimize the risk of future attacks.</p><p>Here are some of the key tasks performed by DFIR specialists:</p><ul><li><strong>Receiving and triaging incident reports:</strong> DFIR teams receive reports from various sources, such as security systems, employees, or customers. They assess the severity of each incident and prioritize their response accordingly.</li><li><strong>Initial containment and eradication:</strong> DFIR specialists work to contain the incident by isolating the affected systems, preventing further spread of malware, and removing malicious code.</li><li><strong>Evidence collection and preservation:</strong> They gather digital evidence from various sources, such as compromised systems, network logs, and social media accounts. They follow strict procedures to ensure the integrity and admissibility of evidence in legal proceedings.</li><li><strong>Forensic analysis and reconstruction:</strong> They analyze the collected evidence to identify the root cause of the incident, track the attacker&apos;s actions, and determine the extent of the damage. They use specialized tools and techniques to reconstruct the timeline of events and identify the tools and techniques used by the attacker.</li><li><strong>Reporting and remediation:</strong> They prepare comprehensive reports documenting their findings and recommendations for remediation. They work with IT teams to implement security patches, strengthen access controls, and improve incident response procedures.</li></ul><p>DFIR is a rapidly growing field due to the increasing sophistication and frequency of cyberattacks. Organizations need to invest in DFIR capabilities to protect their data, systems, and reputation.</p>]]></content:encoded></item><item><title><![CDATA[What is OSINT?]]></title><description><![CDATA[<p>OSINT stands for <strong>Open-Source Intelligence</strong>. It is the collection and analysis of publicly available information to answer specific questions or solve problems. OSINT can be used for a variety of purposes, including <strong>investigating criminal activity, identifying potential threats, and gathering information for business intelligence</strong>.</p><p>There are many different sources of</p>]]></description><link>https://christoskoziaris.com/what_is_osint/</link><guid isPermaLink="false">65b51a10ed7f9600017d6092</guid><category><![CDATA[OSINT]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Sat, 27 Jan 2024 15:02:07 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1603145733146-ae562a55031e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDI1fHxTb2NpYWwlMjBtZWRpYXxlbnwwfHx8fDE3MDYzNjc5MDl8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1603145733146-ae562a55031e?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDI1fHxTb2NpYWwlMjBtZWRpYXxlbnwwfHx8fDE3MDYzNjc5MDl8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="What is OSINT?"><p>OSINT stands for <strong>Open-Source Intelligence</strong>. It is the collection and analysis of publicly available information to answer specific questions or solve problems. OSINT can be used for a variety of purposes, including <strong>investigating criminal activity, identifying potential threats, and gathering information for business intelligence</strong>.</p><p>There are many different sources of OSINT data, including <strong>websites, social media, news articles, and public records</strong>. OSINT can be collected manually or using automated tools. Once data has been collected, it can be analyzed using a variety of techniques, including <strong>pattern recognition, sentiment analysis, and social network analysis</strong>.</p><p>OSINT is a valuable tool for a variety of organizations, including <strong>government agencies, law enforcement, businesses, and journalists</strong>. It can be used to <strong>identify potential risks, track down criminals, and gain a deeper understanding of the world around us</strong>.</p><p>Here are some of the benefits of using OSINT:</p><ul><li><strong>It is cost-effective:</strong>&#xA0;OSINT data is publicly available,&#xA0;so there is no cost to collect and analyze it.</li><li><strong>It is timely:</strong>&#xA0;OSINT data is constantly being generated,&#xA0;so it is always up-to-date.</li><li><strong>It is diverse:</strong>&#xA0;OSINT data comes from a variety of sources,&#xA0;so it can provide a comprehensive picture of a situation.</li><li><strong>It is legal:</strong>&#xA0;OSINT data is publicly available,&#xA0;so there is no legal risk associated with collecting and analyzing it.</li></ul><p>Here are some of the limitations of using OSINT:</p><ul><li><strong>It can be biased:</strong>&#xA0;OSINT data is often created by people or organizations with their own agendas,&#xA0;so it can be biased.</li><li><strong>It can be inaccurate:</strong>&#xA0;OSINT data is not always reliable,&#xA0;and it can be difficult to verify the accuracy of the information.</li><li><strong>It can be overwhelming:</strong>&#xA0;There is a lot of OSINT data available,&#xA0;so it can be difficult to find the information you need.</li></ul><p>Despite these limitations, OSINT is a valuable tool that can be used to gather information and solve problems. As OSINT data becomes more available and accessible, it is likely to become even more important in the future.</p><hr><h1 id="references-further-reading">References &amp; Further Reading </h1><p></p><ul><li><a href="https://osintframework.com/?ref=christoskoziaris.com">OSINT framework</a> focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.</li><li>Wikipedia, &apos;<a href="https://www.wikiwand.com/en/Open-source_intelligence?ref=christoskoziaris.com">Open-source intelligence</a>&apos;</li></ul>]]></content:encoded></item><item><title><![CDATA["Tsurugi" (剣) the Sword and the Linux Distribution]]></title><description><![CDATA[<p></p><p><em>The tsurugi is a straight, double-edged sword that was used in ancient Japan. It was one of the oldest and most prestigious types of Japanese swords, and it was often used by ancient Japan monks and samurai warriors. Tsurugi were typically made of high-quality steel and were decorated with elaborate</em></p>]]></description><link>https://christoskoziaris.com/tsurugi_the_sword_and_the_linux_distribution/</link><guid isPermaLink="false">65b4efdaed7f9600017d605c</guid><category><![CDATA[Tsurungi Linux]]></category><category><![CDATA[DFIR]]></category><category><![CDATA[OSINT]]></category><category><![CDATA[InfoSec Tools]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Sat, 27 Jan 2024 12:10:55 GMT</pubDate><media:content url="https://christoskoziaris.com/content/images/2024/01/1_dGkN8hk-S4Lh-tesTupCsA.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://christoskoziaris.com/content/images/2024/01/1_dGkN8hk-S4Lh-tesTupCsA.jpg" alt="&quot;Tsurugi&quot; (&#x5263;) the Sword and the Linux Distribution"><p></p><p><em>The tsurugi is a straight, double-edged sword that was used in ancient Japan. It was one of the oldest and most prestigious types of Japanese swords, and it was often used by ancient Japan monks and samurai warriors. Tsurugi were typically made of high-quality steel and were decorated with elaborate carvings and engravings.</em></p><p>Now, <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> is a specialized Linux distribution that is designed for digital forensics investigations. It comes with a comprehensive set of tools for collecting, analyzing, and preserving digital evidence. Tsurugi Linux is also relatively lightweight and portable, which makes it easy to use on a variety of devices.</p><p><em>&#x201C;We&#x2019;ve crafted a user-friendly experience, organizing the main menu in a logical forensic analysis sequence. Our menu is your roadmap from device acquisition to integrity checks, artifact extraction, and reporting tools. It&#x2019;s not just about familiarity; it&#x2019;s about exploration. Dig into menu categories to discover new tools that cater to your analysis needs. And for the seasoned experts, every tool is at your fingertips, ready to be wielded precisely through the command line console, </em></p><p><em>...</em>  </p><p><em>The most important feature is the device write blocker at kernel level that by default put every connected device in Read-Only mode to avoid any accidental modification to the artifacts and so potentially compromise the investigation. Running the distro in TEXT mode (CLI) open a special Acquisition Wizard tool we built, based on ncurses, that allow the analyst to easily follow the instructions just using a small amount of resources (CPU/RAM).&#x201D; </em></p><p>- Giovanni Rattaro, <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> core developer.</p><p><a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux </a>is an open-source distribution specifically designed for digital forensics (<a href="https://christoskoziaris.com/dfir/"><a href="https://christoskoziaris.com/what_is_dfir/">DFIR</a></a>) investigations. It provides a comprehensive set of tools for collecting, analyzing, and preserving digital evidence. Here are some of its key features:</p><ol><li><strong>Customized Menu and Tool Organization:</strong> The main menu is structured logically to guide <a href="https://christoskoziaris.com/dfir/"><a href="https://christoskoziaris.com/what_is_dfir/">DFIR</a></a> analysts through the investigation process, from device acquisition to artifact extraction and reporting. Tools are categorized into six main phases of <a href="https://christoskoziaris.com/dfir/"><a href="https://christoskoziaris.com/what_is_dfir/">DFIR</a></a> investigations: Imaging, Hashing, Mounting, Timelines, Artifacts Analysis, and Reporting.</li><li><strong>Write Blocker System:</strong> To prevent accidental or unauthorized modification of evidence, <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> employs a kernel-level write blocker, ensuring that the integrity of acquired data remains intact.</li><li><strong>OSINT Menu Switcher:</strong> A dedicated <a href="https://christoskoziaris.com/what_is_osint/">OSINT</a> Profile Switcher streamlines the <a href="https://christoskoziaris.com/what_is_osint/">OSINT</a> investigation workflow by providing a quick access to a tailored subset of tools relevant to open-source intelligence gathering. It also adapts the wallpaper to reflect the <a href="https://christoskoziaris.com/what_is_osint/">OSINT</a> focus.</li><li><strong>Customizable Interface:</strong> <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> offers extensive customization options, allowing users to create and personalize profiles that match their specific investigative needs. This includes customizing the desktop layout, menu shortcuts, and tool configurations.</li><li><strong>Extensive Toolset:</strong> <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> includes a wide range of open-source DFIR tools, covering various aspects of digital evidence analysis, from imaging and hashing to malware analysis, network forensics, and mobile forensics.</li><li><strong>Portability and Lightweightness:</strong> <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> is designed to run on a variety of hardware platforms, including desktops, laptops, and even USB devices, making it a portable solution for on-site investigations.</li><li><strong>Documentation and Community Support:</strong> <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> provides extensive documentation and a vibrant community forum for users to seek assistance, share knowledge, and contribute to the project&apos;s development.</li></ol><p><a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> is available for free on the official website.</p><p><a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> comes with excellent <a href="https://tsurugi-linux.org/documentation.php?ref=christoskoziaris.com" rel="noreferrer">documentation </a>where one can find many information about the project and discover several hidden features. Furthermore a <a href="https://tsurugi-linux.org/documentation_tsurugi_linux_tools_listing.php?ref=christoskoziaris.com" rel="noreferrer">full list of the Tools</a> <a href="https://tsurugi-linux.org/?ref=christoskoziaris.com" rel="noreferrer">Tsurugi Linux</a> comes with is included.</p><p></p><p><em>&#x201C;TSURUGI Linux - the sharpest weapon in your DFIR arsenal&#x201D;</em></p>]]></content:encoded></item><item><title><![CDATA[The Fundamentals of Risk Management: Risk Literacy & Perception]]></title><description><![CDATA[<p>It&apos;s nearly pointless to start talking about security and risk management if the other party is risk illiterate and our risk perceptions are not aligned. Risk literacy is absolutely mandatory and a prerequisite, in order to deploy security controls, or shape culture in an organization, and actually this</p>]]></description><link>https://christoskoziaris.com/2022-09a-the_fundamentals_of_risk_management-_risk_literacy_-_perception/</link><guid isPermaLink="false">656fc5bced7f9600017d5f80</guid><category><![CDATA[Risk Management]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Sun, 11 Sep 2022 17:20:14 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1517984922331-8dbaa8ffa9c1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDF8fFJpc2slMjBQZXJjZXB0aW9ufGVufDB8fHx8MTY2MjkxNjg1NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1517984922331-8dbaa8ffa9c1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDF8fFJpc2slMjBQZXJjZXB0aW9ufGVufDB8fHx8MTY2MjkxNjg1NQ&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="The Fundamentals of Risk Management: Risk Literacy &amp; Perception"><p>It&apos;s nearly pointless to start talking about security and risk management if the other party is risk illiterate and our risk perceptions are not aligned. Risk literacy is absolutely mandatory and a prerequisite, in order to deploy security controls, or shape culture in an organization, and actually this acknowledgment should be part of an ongoing training program that should take place.</p><div class="kg-card kg-callout-card kg-callout-card-grey"><div class="kg-callout-emoji">&#x2139;&#xFE0F;</div><div class="kg-callout-text">Risk literacy refers to one&#x2019;s practical ability to evaluate and understand risk in the service of skilled and informed decision-making.<br><br>- www.riskliteracy.org</div></div><p>Obviously, the word &apos;risk&apos; has many uses (e.g., exposure to danger and loss; variability in probability distributions; the effect of uncertainty on objectives), but within this context, the risk this article is concerned with, is related to information security risks.  So, generally speaking, the risk may be divided into 6 major risk categories:</p><ul><li><strong>Health and safety risk</strong>. General health and safety risks can be presented in a variety of forms, regardless of whether the workplace is an office or construction site.</li><li><strong>Reputational risk</strong>. All businesses have a reputation to maintain, with their stakeholders, including investors, employees, and of course, customers.</li><li><strong>Operational risk</strong>. Although day-to-day operations are often tried and tested to minimize dangers, incidents or unexpected circumstances could still take place.</li><li><strong>Strategic risk</strong>. While the day-to-day operations of any organization are important, managing the organization&apos;s strategic goals are fundamental to future success.</li><li><strong>Compliance risk</strong>. Government bodies have in place an array of industry laws, regulations, policies, and best practices in place to ensure ethical business practices.</li><li><strong>Financial risk</strong>. Most types of risk have financial consequences, like extra costs or lost revenue. Financial risk, though, specifically refers to money flowing in and out of your business and the chance for sudden financial loss.</li></ul><p>Information security risks are part of the operational risk and may lead to reputational, compliance, and financial risks. Furthermore, safety risks may lead to information security risks, eg. an earthquake or a fire in a data center. So the above categories are much more interrelated in several ways. This interrelation and complexity require risk literacy and proper risk perception in order to &apos;manage&apos; risk.</p><p>There is enough scientific research to prove that the lack of understanding fundamentals of risk affects decision-making.  If you&apos;re involved in risk management at your organization, there&#x2019;s sure to be a great deal of responsibility placed on your shoulders to ensure that not only threats to your organization are managed, but that your company is positioned to meet its objectives and make informed decisions.</p><p>As already said, risk perception is also another factor that affects the decision-making process. There are several determinants that influence risk perception. Primary among these is trust. If the recipient of a message does not trust the source, it is likely that the message will not be believed. Trust between experts and the public is dependent upon effective risk communication. The delivery of accurate and transparent information is a critical element of gaining trust.</p><p>Studies have shown that there are two pathways through which the amygdala&apos;s fear responses can be triggered: a fast &quot;low road&quot; from the thalamus to the amygdala, and a slower &quot;high road&quot; that passes from the thalamus to the neocortex, and only then to the amygdala, said LeDoux. The two paths do not always reach the same conclusions, he explained. The relatively crude &quot;low road&quot; may respond to a long, thin object as a dangerous snake--and trigger an immediate fear response--while the slower &quot;high road&quot; is determining that the object is a harmless stick.</p><p>Evolutionarily speaking, it may make sense for the faster pathway to err on the side of caution, said LeDoux; after all, &quot;it&apos;s probably better to treat a stick as a snake than a snake as a stick.&quot; But the disconnection between &quot;low&quot; and &quot;high&quot; roads, which was first discovered in rats but has since been corroborated in humans, could also be responsible for some psychopathologies. &quot;We know that lots of people have fears that they can&apos;t come to conscious terms with,&quot; said LeDoux. &quot;People who have pathological fears may be treating sticks as snakes all the time, metaphorically.&quot;</p><p>Considering both of the above factors: risk literacy and perception in risk management programs will certainly facilitate the progress towards a more successful outcome and build sustainable risk culture in any organization.</p><hr><p>Do you understand risk?<br>Click below to find out how risk literate you are compared to educated people from around the world. It takes only 2 minutes to find out:</p><div class="kg-card kg-button-card kg-align-center"><a href="http://www.riskliteracy.org/?ref=christoskoziaris.com" class="kg-btn kg-btn-accent">Take the Test</a></div><hr><p>I urge you to watch <a href="https://www.wikiwand.com/en/Gerd_Gigerenzer?ref=christoskoziaris.com">Gerd Gigerenzer</a> at TEDxZurich talking about &apos;Risk literacy&apos;.<br>
<strong><a href="https://www.wikiwand.com/en/Gerd_Gigerenzer?ref=christoskoziaris.com">Gerd Gigerenzer</a></strong> is a German&#xA0;<a href="https://www.wikiwand.com/en/Psychologist?ref=christoskoziaris.com" title="Psychologist">psychologist</a>&#xA0;who has studied the use of&#xA0;<a href="https://www.wikiwand.com/en/Bounded_rationality?ref=christoskoziaris.com">bounded rationality</a>&#xA0;and&#xA0;<a href="https://www.wikiwand.com/en/Heuristic?ref=christoskoziaris.com" title="Heuristic">heuristics</a>&#xA0;in&#xA0;<a href="https://www.wikiwand.com/en/Decision_making?ref=christoskoziaris.com" title="Decision making">decision making</a>. At the time this post was written, Gigerenzer is director emeritus of the Center for Adaptive Behavior and Cognition (ABC) at the&#xA0;<a href="https://www.wikiwand.com/en/Max_Planck_Institute_for_Human_Development?ref=christoskoziaris.com">Max Planck Institute for Human Development</a>&#xA0;and director of the <a href="https://www.wikiwand.com/en/Gerd_Gigerenzer?ref=christoskoziaris.com#citenote2">Harding Center for Risk Literacy</a>&#xA0;both in&#xA0;Berlin.</p>
<figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/g4op2WNc1e4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen title="Risk literacy: Gerd Gigerenzer at TEDxZurich"></iframe></figure><hr><p><a href="https://www.wikiwand.com/en/David_Ropeik?ref=christoskoziaris.com">David Ropeik</a> is a consultant in Risk Perception, Risk Communication, and Risk Management; an Instructor at Harvard; Author of several books including: &quot;How Risky Is It, Really? Why Our Fears Don&apos;t Always Match the Facts&quot;; blogger at <a href="https://bigthink.com/?ref=christoskoziaris.com">BigThink.com</a>, <a href="https://www.psychologytoday.com/intl?ref=christoskoziaris.com">Psychology Today</a>,<a href="https://www.huffpost.com/?ref=christoskoziaris.com"> Huffington Post</a>; &quot;Risk: Reason and Reality&quot;; former television journalist in Boston and twice winner of the DuPont Columbia Award, often referred to as the Pulitzer Prize of broadcast journalism. He talks about The Risk Perception Gap: Why we sometimes worry more than the evidence warrants or less than the evidence warns, and what we can do to reduce the risk that rises when we get risk wrong.</p><figure class="kg-card kg-embed-card"><iframe width="200" height="113" src="https://www.youtube.com/embed/vlFT6nEFaLQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen title="The risk perception gap: David Ropeik at TEDxWaldenPond"></iframe></figure><hr><h2 id="references-further-reading">References &amp; Further Reading</h2><ul><li><a href="https://en.wikipedia.org/wiki/Joseph_E._LeDoux?ref=christoskoziaris.com">Ledoux, Joseph</a> (1998), The Emotional Brain: The Mysterious Underpinnings of Emotional Life, Simon &amp; Schuster</li><li><a href="https://en.wikipedia.org/wiki/Joseph_E._LeDoux?ref=christoskoziaris.com">Ledoux, Joseph</a> (2012), <a href="https://www.sciencedirect.com/science/article/pii/S0896627312001298?ref=christoskoziaris.com">&quot;Rethinking the emotional brain&quot;</a>. <em>Neuron</em> <strong>73</strong>, 653&#x2013;676</li><li><a href="http://www.riskliteracy.org/?ref=christoskoziaris.com">RiskLiteracy.org</a>, a nonprofit university-based project designed to help increase awareness about risk literacy, (accessed 2002.09)</li><li><a href="https://www.huffpost.com/author/dpr-359?ref=christoskoziaris.com">Ropeik, David | HuffPost</a></li><li><a href="http://www.psychologytoday.com/experts/david-ropeik?ref=christoskoziaris.com">Ropeik,David | psychologytoday.com</a></li><li><a href="https://en.wikipedia.org/wiki/David_Ropeik?ref=christoskoziaris.com">Ropeik, David</a> (2010, 1st edition), How Risky Is It, Really?: Why Our Fears Don&apos;t Always Match the Facts, McGraw Hill</li><li><a href="https://en.wikipedia.org/wiki/Amos_Tversky?ref=christoskoziaris.com">Tversky, Amos</a>; <a href="https://en.wikipedia.org/wiki/Daniel_Kahneman?ref=christoskoziaris.com">Kahneman, Daniel</a> (Sep. 27, 1974), &quot;<a href="https://www2.psych.ubc.ca/~schaller/Psyc590Readings/TverskyKahneman1974.pdf?ref=christoskoziaris.com">Judgment under Uncertainty: Heuristics and Biases</a>&quot; Science, New Series, Vol. 185, No. 4157, pp. 1124-1131</li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[Coming soon]]></title><description><![CDATA[This is Information Security and the Art of Living Taking Risks, a brand new blog by Christos Koziaris]]></description><link>https://christoskoziaris.com/2022-08a-coming-soon/</link><guid isPermaLink="false">656fc5bced7f9600017d5f7d</guid><category><![CDATA[Blog News]]></category><dc:creator><![CDATA[Christos Koziaris]]></dc:creator><pubDate>Tue, 23 Aug 2022 12:15:45 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1530319067432-f2a729c03db5?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDR8fEhlbGxvJTIwYXBwbGV8ZW58MHx8fHwxNjYxNDIwMzQ0&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1530319067432-f2a729c03db5?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDR8fEhlbGxvJTIwYXBwbGV8ZW58MHx8fHwxNjYxNDIwMzQ0&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Coming soon"><p>This is <a href="https://christoskoziaris.com/">Information Security and the Art of Living Taking Risks</a>, a brand new blog by Christos Koziaris that&apos;s just getting started. Things will be up and running here shortly, but you can <a href="#/portal/">subscribe</a> in the meantime if you&apos;d like. The subscription is free. Subscribers will be able to comment on all posts and also have access to exclusive content when this is published!</p><p>If you want to follow the blog and stay updated about new posts, you may follow me on <a href="https://twitter.com/Koziaris?ref=christoskoziaris.com">twitter</a> or use the RSS service featured on the Home page.</p>]]></content:encoded></item></channel></rss>