# The Three Laws of Cybersecurity

## Metadata
- Author: [[Gianclaudio Moresi]]
- Full Title: The Three Laws of Cybersecurity
- Category: #books
## Highlights
- Usually, it is possible to allocate till 50% more VCPUs than real physical CPUs. ([Location 1329](https://readwise.io/to_kindle?action=open&asin=B09QGR5642&location=1329))
- Tags: [[pink]]
- process he called "hyper jacking" is the idea to crack the Operating System of the Virtualization. Some examples of this include the Kaseya Security Breach in 2021, Dropbox security breach in 2014, and iCloud 2014 leak. If the hackers can “hyper jack” the virtualization, they will ask for money: it’s an extorsion. If the company does not pay the money, the data, files, passwords and so will be exposed and indexed to the internet, making the information public. ([Location 1349](https://readwise.io/to_kindle?action=open&asin=B09QGR5642&location=1349))
- Tags: [[pink]]
- However, NAT breaks the originally envisioned model of IP end-to-end connectivity across the Internet and introduces complications in communication between hosts and has performance impacts. ([Location 1600](https://readwise.io/to_kindle?action=open&asin=B09QGR5642&location=1600))
- Tags: [[pink]]
- 3 – Keep 3 copies of any important file 2 – Keep the files on 2 different media types 1 – Store 1 copy offline ([Location 1764](https://readwise.io/to_kindle?action=open&asin=B09QGR5642&location=1764))
- Tags: [[pink]]