Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Uncovering Assumptions in Information Security

    19581_downloaded_stream_99.pdf (139.4Kb)
    Access Status
    Open access
    Authors
    Armstrong, Helen
    Bishop, M.
    Date
    2005
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Armstrong, Helen and Bishop, Matt. 2005. : Uncovering Assumptions in Information Security, in Miloslavskaya, Natalia and Armstrong, Helen (ed), WISE4 Forth World Conference "Information Security Education ", May 18 2005, pp. 223-231. Moscow, Russia: Moscow Engineering Physics Institute (State University), Russia.
    Source Title
    Success Through Information Security Knowledge - Proceedings of the IFIP TC11 WG 11.8 Forth World Conference "Information Security Education" (WISE4)
    Source Conference
    WISE4 Forth World Conference "Information Security Education "
    Additional URLs
    http://www.ifip.org/home.html
    Faculty
    Curtin Business School
    School of Information Systems
    Remarks

    This article originally published by the International Federation for Information Processing.

    URI
    http://hdl.handle.net/20.500.11937/37157
    Collection
    • Curtin Research Publications
    Abstract

    The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented.

    Related items

    Showing items related by title, author, creator and subject.

    • The (default) strategy determining the secuirty of Australia's energy supply
      Chester, Lynne (2008)
      The matter of Australia's energy supply security has been totally eclipsed by the current debate on climate change. Should we be concerned? What is energy security and how is it determined? What impact will climate change ...
    • Towards enhanced key management in multi-phase ZigBee network architecture
      Tian, Biming; Han, Song; Liu, Liu; Khadem, Saghar; Parvin, Sazia (2011)
      ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. ...
    • A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
      Tian, Biming; Han, Song; Parvin, Sazia; Dillon, Tharam S. (2010)
      The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.