𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Managing network security — Part 8: Relativistic risk assessment

✍ Scribed by Fred Cohen


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
247 KB
Volume
1997
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology.


📜 SIMILAR VOLUMES


Managing network security — Part 5: Risk
✍ Fred Cohen 📂 Article 📅 1997 🏛 Elsevier Science 🌐 English ⚖ 640 KB

Properly conducted penetration testing is a viable mechanism for providing practical, "where the rubber meets the road" assessment of a given firewall implementation's overall strength. Management should remember, limitations of a given test when considering the results. References

Managing network security: Risk staging
✍ Fred Cohen 📂 Article 📅 1998 🏛 Elsevier Science 🌐 English ⚖ 470 KB

Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management dec

Managing Network Security — Part 3: Netw
✍ Fred Cohen 📂 Article 📅 1997 🏛 Elsevier Science 🌐 English ⚖ 483 KB

Over the last few years computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management deci