A Multilayered Approach to Information Security A Multilayered Approach to Information Security

Establishing multiple layers of defense is critical to protecting valuable information assets. An effective multilayered defense involves no...

Read more »
11:35 PM

Physical, Procedural, and Technical Controls in Information Security Physical, Procedural, and Technical Controls in Information Security

In this post, I will briefly discuss the three major types or categories of controls that can be used to defend information systems – namely...

Read more »
6:42 PM

Using Multiple Controls or Countermeasures for Information Security Using Multiple Controls or Countermeasures for Information Security

In this post I would like to talk about using multiple controls or countermeasures for information security purposes. To begin, consider a c...

Read more »
10:35 PM

Defending against Attacks on Information Systems Defending against Attacks on Information Systems

In broad terms, there are six different approaches that can be used to defend information systems against attacks by malicious parties. The ...

Read more »
11:35 PM

Prerequisites for Attacking an Information System Prerequisites for Attacking an Information System

In order for an attack on an information system to succeed, an attacker must possess three specific things: (1) method , (2) opportunity , a...

Read more »
9:16 PM

Harm and the Value of Information Assets Harm and the Value of Information Assets

Although in an earlier post I discussed the four types of acts that can cause harm to an information system, here I would like to briefly d...

Read more »
9:52 PM

Types of Information System Attackers Types of Information System Attackers

Who are these people who seek to compromise the confidentiality, integrity, or availability of our information assets? Surprisingly, many at...

Read more »
11:26 PM

Understanding Threats to Information Systems Understanding Threats to Information Systems

To better understand the various ways in which the confidentiality, integrity, or availability of information assets can be threatened, cons...

Read more »
9:21 PM

Integrity, Availability, and Information Security Integrity, Availability, and Information Security

In an earlier post , I discussed confidentiality in the context of information security. In this post, I would like to elaborate on the rema...

Read more »
10:47 PM

Confidentiality and Information Security Confidentiality and Information Security

When it comes to confidentiality, a good information security strategy is to adopt the need-to-know basis for determining who has access to ...

Read more »
6:32 PM

Harm and Information Assets Harm and Information Assets

In this post, I’d like to discuss harmful acts in the context of information assets. To begin, recall that information security seeks to pr...

Read more »
12:18 PM

The Pillars of Information Security The Pillars of Information Security

I’d like to begin this post by discussing information security threats in the context of what has come to be known as CIA -- confidentiality...

Read more »
10:34 PM

Vulnerabilities, Threats, and Controls in Information Security Vulnerabilities, Threats, and Controls in Information Security

In an earlier post , I noted that one of the major goals of information security is to mitigate security risks. Another major goal of inform...

Read more »
9:24 PM

On the Valuation of Information Assets On the Valuation of Information Assets

When considering the diagram below, remember that the perceived value of an information asset depends in part upon the ease with which that ...

Read more »
2:56 PM

Information Assets and the Scope of Information Security Information Assets and the Scope of Information Security

When thinking about information security, it’s important to remember that as a discipline and as a profession, information security has a va...

Read more »
1:37 PM

Computer Security and Information Technology Failure Computer Security and Information Technology Failure

Although many people think of the world of information privacy and security as one characterized by hackers, cyber terrorists, or government...

Read more »
12:54 AM

Information Security and Human Dependence on Computers Information Security and Human Dependence on Computers

How dependent are you upon information and communication technologies? If you’re like most people in the developed world, your day-to-day ac...

Read more »
12:25 AM

Philosophical Thoughts on Information Security Philosophical Thoughts on Information Security

To begin this series of posts on computer and information security, I wanted to pose an interesting philosophical question: namely, why is ...

Read more »
11:50 PM
 
Top