Uncovering Assumptions in Information Security
Access Status
Open access
Authors
Armstrong, Helen
Bishop, M.
Date
2005Type
Conference Paper
Metadata
Show full item recordCitation
Armstrong, Helen and Bishop, Matt. 2005. : Uncovering Assumptions in Information Security, in Miloslavskaya, Natalia and Armstrong, Helen (ed), WISE4 Forth World Conference "Information Security Education ", May 18 2005, pp. 223-231. Moscow, Russia: Moscow Engineering Physics Institute (State University), Russia.
Source Title
Success Through Information Security Knowledge - Proceedings of the IFIP TC11 WG 11.8 Forth World Conference "Information Security Education" (WISE4)
Source Conference
WISE4 Forth World Conference "Information Security Education "
Additional URLs
Faculty
Curtin Business School
School of Information Systems
Remarks
This article originally published by the International Federation for Information Processing.
Collection
Abstract
The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented.
Related items
Showing items related by title, author, creator and subject.
-
Chester, Lynne (2008)The matter of Australia's energy supply security has been totally eclipsed by the current debate on climate change. Should we be concerned? What is energy security and how is it determined? What impact will climate change ...
-
Tian, Biming; Han, Song; Liu, Liu; Khadem, Saghar; Parvin, Sazia (2011)ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. ...
-
Tian, Biming; Han, Song; Parvin, Sazia; Dillon, Tharam S. (2010)The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed ...