In light of the many recent cyber attacks, do you, the reader, ever seize for a moment to reflect on you own security? What about the security of your environment? Ever experience a breach in security? I presume most of us have had our security compromised in some form or another.
With humanity having a more interconnected society thanks in part to the Internet; we are able to more easily witness such breaches (typically with compromised social media accounts), but this essence of security applies everywhere. Although it may seem corporations are focused solely on digital threats, physical threats are too a major concern. The question as to if oneself is secure arises often as security incidents increase and knowledge of vulnerabilities decrease. With attacks being able to be initiated through a plethora of modes, it becomes increasingly more difficult to be secure.
This is where assessing your security level comes into play. You may be pondering as to what a security level is, well I will tell you. A security level is a latent construct, appraised through correlating indicators. Since an individual’s security level can not be directly observed, it has to be judged based upon other factors, such as: perceived threats, previous breaches, security procedures, etc. Akin to IQ, in that both may not be explicitly observed but with their deterministic characteristics, inferred.
With this knowledge you should be able to enumerate a list of possible security threats you face; whether it be not possessing locks on all your doors or utilizing an identical password for all your online accounts and assess your security level and possibly add patches to these vulnerabilities in your agendum. However, this will only serve as a basic security level — which should be sufficient for the average person — due in part to threats being stochastic in nature; it would take some serious statistical analysis to find, mitigate, and prevent any threat(s).
While I understand this page consisted of a copious amount of general information, its purpose is not to cater to special circumstances but provide common folk with the general concept of how to secure oneself. Now, don’t go on thinking once you have patched your checklist of vulnerabilities you will be safe, as aforementioned above, threats are stochastic and if you wish to remain secure, you must mitigate and prevent any threat in perpetuum.