Skip to content

Commit 730c8a2

Browse files
authored
Merge pull request #4 from tkokhing/frontier
major re-org, allow dynamic language ch in MDX
2 parents 971771a + ea67cf2 commit 730c8a2

20 files changed

Lines changed: 460 additions & 18 deletions
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: Cybersecurity Domains: A Strategic Perspective
3+
excerpt: "Cybersecurity is a broad and interconnected discipline, comprising various domains that address specific threats, technologies, and organizational needs. To simplify this complexity, I provided a thematic overview to make illustration easy."
4+
coverImage: "/assets/blog/rise_of_supply-chain_attacks/cover.jpg"
5+
date: "2025-05-05T11:43:17.322Z"
6+
author:
7+
name: tkokhing
8+
picture: "/img/logo/tkokhing.gif"
9+
ogImage:
10+
url: "/assets/blog/rise_of_supply-chain_attacks/cover.jpg"
11+
subPath: "blog/posts"
12+
postStatus: "Updated on: "
13+
---
14+
15+
## **Cybersecurity Domains: A Strategic Perspective**
16+
17+
Cybersecurity is a broad and interconnected discipline, comprising various domains that address specific threats, technologies, and organizational needs. To bring structure to this complex ecosystem, this article presents a thematic overview of key cybersecurity areas — grouped into foundational network defenses, human-centric safeguards, and strategic architectural models.
18+
19+
These domains span from core infrastructure to applications, cloud platforms, endpoint devices, and ultimately, human factors. This thematic framing mirrors how security is typically deployed in practice — through defense-in-depth and adaptive risk management.
20+
21+
22+
### **Foundational Network Defenses**
23+
24+
**Network Security:**
25+
Protects networks from unauthorized access, data breaches, and cyberattacks using firewalls, intrusion detection/prevention systems (IDS/IPS), Extended Detection and Response (XDR), and Network Detection and Response (NDR) tools. It also enforces secure configurations and access controls, including remote access protections such as Virtual Private Networks (VPNs) and Multi-Factor Authentication (MFA), which add critical layers of identity verification at network entry points.
26+
27+
**Endpoint Security:**
28+
Secures individual devices — such as laptops, smartphones, and IoT endpoints (including edge and fog computing systems) — against malware, ransomware, and unauthorized access.
29+
30+
**Physical Security:**
31+
Protects physical assets, facilities, and devices from tampering, theft, or sabotage — essential for securing edge/IoT deployments, data centers, and operational technology environments.
32+
33+
**Application Security:**
34+
Identifies and mitigates vulnerabilities in software through secure coding practices, robust authentication, encryption, and rigorous testing frameworks such as static and dynamic application security testing (SAST/DAST).
35+
36+
**Web Security:**
37+
Defends web applications from threats like XSS, SQL injection, CSRF, and session hijacking using input validation, HTTPS enforcement, proper authentication, and Web Application Firewalls (WAFs).
38+
39+
**Cloud Security:**
40+
Safeguards cloud-based data, applications, and infrastructure with encryption, identity and access management (IAM), secure configurations, and continuous monitoring.
41+
42+
**Information Security:**
43+
Protects both structured and unstructured data — at rest and in transit — through access control policies, encryption, and adherence to privacy and regulatory standards (e.g., GDPR, ISO/IEC 27001).
44+
45+
**IoT Security:**
46+
Addresses the vulnerabilities of connected devices by securing firmware, communication protocols, and access control, ensuring both integrity and availability across smart environments.
47+
48+
**Mobile Security:**
49+
Secures smartphones and tablets from threats like mobile malware, spyware, SIM-jacking, and unauthorized access to corporate resources.
50+
51+
---
52+
53+
### **Human-Centric Safeguards**
54+
55+
**Human-Centric Security (Social Engineering):**
56+
Targets the human layer through manipulation tactics that exploit fear, pressure, curiosity, or greed. Techniques such as phishing, pretexting, baiting, and tailgating remain prevalent. Defense strategies include employee awareness training, phishing simulation exercises, strong authentication protocols such as Multi-Factor Authentication (MFA), and behavioral anomaly detection.
57+
58+
---
59+
60+
### **Strategic Architectural Models**
61+
62+
**Zero Trust Architecture:**
63+
A security model that never assumes trust by default — every user, device, and request is continuously authenticated, authorized, and validated, regardless of network location.
64+
65+
**Layered Defense-in-Depth:**
66+
A holistic approach to security that deploys multiple overlapping security controls across all layers of an organization’s technology stack — from perimeter defenses to application-level protections — ensuring redundancy and resilience.
67+
68+
**Real-Time Detection and Response:**
69+
Incorporates modern Security Information and Event Management (SIEM) systems, Security Orchestration, Automation, and Response (SOAR), and Managed Detection and Response (MDR) capabilities to detect, analyze, and respond to threats in real time, enabling proactive threat hunting and rapid incident containment.
70+
71+
## **Closing Paragraph**
72+
73+
The defenses listed here are not an exhaustive set, nor are they a silver bullet against all threats. What organizations truly need is a cohesive system of layered and contextual security. In the next article of this series, I’ll dive deeper into each theme — showing how these domains interconnect to secure the enterprise network.
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
---
2+
title: 网络安全领域:战略视角
3+
excerpt: "网络安全是一门广泛且相互关联的学科,涵盖应对特定威胁、技术和组织需求的各个领域。为了简化其复杂性,我提供了一个主题概述,以便于理解。"
4+
coverImage: "/assets/blog/rise_of_supply-chain_attacks/cover.jpg"
5+
date: "2025-05-05T11:43:17.322Z"
6+
author:
7+
name: tkokhing
8+
picture: "/img/logo/tkokhing.gif"
9+
ogImage:
10+
url: "/assets/blog/rise_of_supply-chain_attacks/cover.jpg"
11+
subPath: "blog/posts"
12+
postStatus: "Updated on: "
13+
---
14+
15+
## **网络安全领域:战略视角**
16+
17+
网络安全是一门广泛且相互关联的学科,涵盖多个领域,分别应对特定的威胁、技术及组织需求。为了为这一复杂的生态系统带来结构化的理解,本文以主题化方式概览了关键的网络安全领域 —— 分为基础网络防御、以人为本的安全措施,以及战略架构模型。
18+
19+
这些领域涵盖了从核心基础设施到应用程序、云平台、终端设备,最终延伸至人的因素。这样的主题化框架也反映了实际中的安全部署方式 —— 深度防御和弹性风险管理。
20+
21+
---
22+
23+
### **基础网络防御**
24+
25+
**网络安全:**
26+
使用防火墙、入侵检测/防御系统(IDS/IPS)、扩展检测与响应(XDR)、网络检测与响应(NDR)等工具保护网络免受未经授权的访问、数据泄露与网络攻击。此外,还需强制实施安全配置和访问控制,包括虚拟专用网络(VPN)和多因素认证(MFA)等远程访问防护措施,这些技术在网络入口点增加了关键的身份验证层。
27+
28+
**终端安全:**
29+
保护各类设备——如笔记本电脑、智能手机以及物联网终端(包括边缘与雾计算系统)——免受恶意软件、勒索软件和未授权访问的威胁。
30+
31+
**物理安全:**
32+
防止物理资产、设施和设备遭到篡改、盗窃或破坏——这对于边缘/物联网部署、数据中心和运营技术环境尤为关键。
33+
34+
**应用安全:**
35+
通过安全编码实践、强身份验证、加密技术以及静态与动态应用安全测试(SAST/DAST)等严格测试框架,识别并缓解软件中的漏洞。
36+
37+
**Web 安全:**
38+
通过输入验证、强制启用 HTTPS、规范身份验证机制和部署 Web 应用防火墙(WAF),防御诸如 XSS、SQL 注入、CSRF 和会话劫持等网络应用威胁。
39+
40+
**云安全:**
41+
通过加密、身份与访问管理(IAM)、安全配置和持续监控,保障基于云的数据、应用和基础设施的安全。
42+
43+
**信息安全:**
44+
通过访问控制策略、加密机制,以及符合隐私和法规标准(如 GDPR、ISO/IEC 27001)来保护静态与动态的结构化和非结构化数据。
45+
46+
**物联网安全:**
47+
通过保护固件、通信协议和访问控制来应对连接设备的漏洞,确保智能环境中的数据完整性和可用性。
48+
49+
**移动安全:**
50+
保护智能手机和平板电脑免受移动恶意软件、间谍软件、SIM 劫持以及对企业资源的未经授权访问。
51+
52+
---
53+
54+
### **以人为本的安全措施**
55+
56+
**人本安全(社交工程):**
57+
针对人的弱点,利用恐惧、压力、好奇心或贪婪等心理进行操控。常见手法包括钓鱼攻击、借口欺诈、诱饵攻击和尾随进入等。防御措施包括员工安全意识培训、钓鱼模拟演练、强身份认证机制(如 MFA)以及行为异常检测。
58+
59+
---
60+
61+
### **战略架构模型**
62+
63+
**零信任架构:**
64+
一种默认不信任任何用户、设备或请求的安全模型 —— 每次访问都必须持续进行身份验证、授权和验证,无论其来自内部还是外部网络。
65+
66+
**多层深度防御:**
67+
一种整体性安全策略,在组织技术架构的各个层级部署多个重叠的安全控制,从边界防御到应用保护,确保安全的冗余性与韧性。
68+
69+
**实时检测与响应:**
70+
集成现代安全信息与事件管理系统(SIEM)、安全编排自动化与响应(SOAR)及托管检测与响应服务(MDR),实现对威胁的实时检测、分析与响应,支持主动威胁狩猎与快速事件处置。
71+
72+
---
73+
74+
## **结束语**
75+
76+
上面列出的防御措施并非面面俱到,也不能作为防范所有威胁的灵丹妙药。企业真正需要建立的是一个具备层次性和上下文感知能力的整体安全体系。在本系列的下一篇文章中,我将深入探讨各个主题,演示它们如何协同防护企业网络安全。
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
# Securing the Digital Frontiers
2+
3+
Asia is growing — and growing fast. This rapid digital expansion **brings immense opportunities, but also introduces complex cybersecurity challenges** that threaten businesses, governments, and individuals alike.
4+
5+
## What Has Changed
6+
7+
As cloud adoption, mobile connectivity, and cross-border commerce surge across the region, the attack surface expands in tandem. Protecting digital assets has evolved into a **strategic imperative for long-term resilience and trust**.
8+
9+
## For Readers Like You
10+
11+
To help businesses on the East and West to navigate this daunting terrain, **Securing the Digital Frontiers** is a bilingual series crafted to deliver clear, practical cybersecurity insights. Each edition unpacks key domains, emerging risks, and proven defense strategies — in both English and Simplified Chinese.
12+
13+
The series offers a structured, strategic lens on cybersecurity, tailored for both technical professionals and business leaders navigating cross-border growth, regulatory complexity, and cloud-first innovation.
14+
15+
---
16+
17+
### ✅ Quick Self-Check: Are You on the Right Page?
18+
19+
Take a moment to reflect before reading further:
20+
21+
- ✅ I recognize that cybersecurity is no longer just a technical concern — it’s a core business imperative.
22+
23+
- ✅ I follow cybersecurity incidents more closely now than I did five years ago.
24+
25+
- ✅ I believe greater cybersecurity awareness would enable me to better protect my organization.
26+
27+
28+
If all the answer is YES, the next page is **for you**.
29+
30+
---
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# 守护数字前沿
2+
3+
亚洲正在快速发展,数字化进程迅猛推进。**这场数字化浪潮带来了巨大的机遇,也带来了复杂的网络安全挑战,威胁着企业、政府和个人的安全与信任。**
4+
5+
## 面临的新局面
6+
7+
随着云端采纳、移动互联和跨境商业在整个亚洲地区迅速增长,攻击面也在不断扩大。保护数字资产已从一项技术需求,**演变为确保长期韧性与信任的战略要务。**
8+
9+
## 为像你一样的读者
10+
11+
为了帮助东西方的企业穿越这片充满挑战的数字疆域,**《守护数字前沿》**系列应运而生。这是一套中英双语的网络安全专栏,旨在提供清晰、实用的安全洞见。每一期内容都将深入解析关键领域、新兴风险和经过验证的防御策略——以英文与简体中文双版本呈现。
12+
13+
本系列以结构化、战略性的视角解读网络安全,既面向技术专业人士,也为那些在跨境拓展、法规合规和云优先创新中寻求安全保障的商业决策者量身打造。
14+
15+
---
16+
17+
### ✅ 快速自检:你来到对的页面了吗?
18+
19+
在继续阅读之前,请先自我确认以下观点:
20+
21+
* ✅ 我意识到网络安全早已不只是技术问题——它是企业核心战略的一部分。
22+
23+
* ✅ 比起五年前,我现在更关注网络安全事件。
24+
25+
* ✅ 我相信提升自身的网络安全意识,将有助于我更好地保护公司或组织。
26+
27+
如果你的答案都是“是”,那么下一页就是**为你而写**
28+
29+
---

next.config.js

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,17 @@
22
* @type {import('next').NextConfig}
33
*/
44

5+
const withMDX = require('@next/mdx')({
6+
extension: /\.mdx$/,
7+
});
8+
59
const nextConfig = {
6-
output: 'export',
7-
distDir: 'dist',
8-
images: {
9-
unoptimized: true
10-
},
11-
};
12-
13-
module.exports = nextConfig;
10+
output: 'export',
11+
distDir: 'dist',
12+
images: {
13+
unoptimized: true,
14+
},
15+
pageExtensions: ['js', 'jsx', 'md', 'mdx', 'ts', 'tsx'], // Add MDX and other extensions
16+
};
17+
18+
module.exports = withMDX(nextConfig);

package-lock.json

Lines changed: 24 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

package.json

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@
1414
"@babel/runtime": "^7.27.0",
1515
"@headlessui/react": "^2.2.0",
1616
"@heroicons/react": "^2.2.0",
17+
"@mdx-js/loader": "^3.1.0",
18+
"@mdx-js/react": "^3.1.0",
1719
"@next/mdx": "^15.3.1",
1820
"@tailwindcss/vite": "^4.1.4",
1921
"ajv": "^8.17.1",
Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
11
export default function CodeLine({ children }: { children: React.ReactNode }) {
2-
return (
3-
<span className="codeline">{children}</span>
4-
);
2+
return <span className="codeline">{children}</span>;
53
}
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
'use client';
2+
3+
import { type ElementType } from 'react';
4+
import LanguageSwitcher from "@/app/_components/language_handler/language-switcher";
5+
import { useLanguage } from "@/app/_components/language_handler/language-provider";
6+
7+
type LanguageChoiceProps = {
8+
components: {
9+
en: ElementType;
10+
zh: ElementType;
11+
};
12+
};
13+
14+
export default function DisplayLanguageContent({ components }: LanguageChoiceProps) {
15+
const { language } = useLanguage();
16+
const DisplayContent = language === 'en' ? components.en:components.zh;
17+
18+
return(
19+
<div>
20+
<div className="fixed bottom-2 right-0 w-full z-20"><LanguageSwitcher /></div>
21+
<DisplayContent />
22+
</div>)
23+
}
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
"use client";
2+
3+
import { createContext, useContext, useState, useEffect, ReactNode } from 'react';
4+
5+
type Language = 'en' | 'zh';
6+
7+
interface LanguageContextProps {
8+
language: Language;
9+
setLanguage: (lang: Language) => void;
10+
error: string | null;
11+
}
12+
13+
const LanguageContext = createContext<LanguageContextProps | undefined>(undefined);
14+
15+
export const LanguageProvider = ({ children }: { children: ReactNode }) => {
16+
const [language, setLanguage] = useState<Language>('en');
17+
const [error, setError] = useState<string | null>(null);
18+
19+
useEffect(() => {
20+
const storedLang = localStorage.getItem('language') as Language;
21+
if (storedLang) setLanguage(storedLang);
22+
}, []);
23+
24+
const changeLanguage = (lang: Language) => {
25+
try {
26+
if (!['en', 'zh'].includes(lang)) {
27+
throw new Error(`Invalid language: ${lang}`);
28+
}
29+
30+
setLanguage(lang);
31+
localStorage.setItem('language', lang);
32+
setError(null);
33+
} catch (error){
34+
if (error instanceof Error) {
35+
setError(error.message);
36+
} else {
37+
setError("Unknown Error Occurred");
38+
}
39+
}
40+
};
41+
42+
return (
43+
<LanguageContext.Provider value={{ language, setLanguage: changeLanguage, error }}>
44+
{children}
45+
</LanguageContext.Provider>
46+
);
47+
};
48+
49+
export const useLanguage = () => {
50+
const context = useContext(LanguageContext);
51+
if (!context) {
52+
throw new Error('useLanguage must be used within a LanguageProvider');
53+
}
54+
return context;
55+
};

0 commit comments

Comments
 (0)