Uncovering Assumptions in Information Security
MetadataShow full item record
The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented.
This article originally published by the International Federation for Information Processing.
Showing items related by title, author, creator and subject.
Chester, Lynne (2008)The matter of Australia's energy supply security has been totally eclipsed by the current debate on climate change. Should we be concerned? What is energy security and how is it determined? What impact will climate change ...
Tian, Biming; Han, Song; Liu, Liu; Khadem, Saghar; Parvin, Sazia (2011)ZigBee is one of impartment wireless technologies now being widely deployed in wireless sensor networks (WSNs). However, ZigBee exhibits several security concerns especially insufficiently addressed key management mechanism. ...
Tian, Biming; Han, Song; Parvin, Sazia; Dillon, Tharam S. (2010)The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed ...