When it comes to confidentiality, a good information security strategy is to adopt the need-to-know basis for determining who has access to ...
Harm and Information Assets
In this post, I’d like to discuss harmful acts in the context of information assets. To begin, recall that information security seeks to pr...
The Pillars of Information Security
I’d like to begin this post by discussing information security threats in the context of what has come to be known as CIA -- confidentiality...
Vulnerabilities, Threats, and Controls in Information Security
In an earlier post , I noted that one of the major goals of information security is to mitigate security risks. Another major goal of inform...
On the Valuation of Information Assets
When considering the diagram below, remember that the perceived value of an information asset depends in part upon the ease with which that ...
Information Assets and the Scope of Information Security
When thinking about information security, it’s important to remember that as a discipline and as a profession, information security has a va...
Computer Security and Information Technology Failure
Although many people think of the world of information privacy and security as one characterized by hackers, cyber terrorists, or government...
Information Security and Human Dependence on Computers
How dependent are you upon information and communication technologies? If you’re like most people in the developed world, your day-to-day ac...
Philosophical Thoughts on Information Security
To begin this series of posts on computer and information security, I wanted to pose an interesting philosophical question: namely, why is ...