๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Why we need a new definition of information security

โœ Scribed by James M. Anderson


Publisher
Elsevier Science
Year
2003
Tongue
English
Weight
101 KB
Volume
22
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


There is an old Peanuts strip where Charlie Brown says, "Working here is like wetting your pants in the pool, wearing a dark bathing suit. You get that warm feeling but nobody notices." Increasingly, I think computer security professionals in large enterprises are in that metaphorical swimming pool. In fact, many are swimming in the deep end without their water wings.

When computer security professionals do an excellent job protecting systems and information, the number of bad outcomes decreases. After a generation of peace, pretty soon people start asking why we need the army. I believe this problem stems in part from a fuzzy fundamental: the definition of information security.

What is information security? Is it, as one would have to conclude from a broad survey of published material, all about Confidentiality, Integrity and Availability (CIA)? There may be no one who says, "information security = CIA." Certainly, infosec=CIA cannot be true in the canonical sense. To measure infosec, one must measure the elements of CIA; measurements that are elusive. The bottom line is that we do not have generally accepted measurements of confidentiality, integrity and availability, other than the raw count of damaging incidents along with tenuous estimates of the damage. When the number of damaging incidents drops due to an effective infosec program, the measurement problem increases. No incidents means no 'before' and 'after' pictures and no measurable return from the avoidance of incidents. Make no mistake; big money is being spent on information security. IDC recently put the total at $17 billion annually in 2001 for infosec products and services in the US, growing to a projected $45 billion estimated by 2006 [1]. Many firms, especially large financial institutions, are spending upwards of 2% of total IT budgets directly on information security. As


๐Ÿ“œ SIMILAR VOLUMES


Why we still need a mark of the cognitiv
โœ Frederick Adams ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 296 KB

What makes a process a cognitive process? I'm not just asking for a list of cognitive processes, but for what makes an item on that list a cognitive process. Why should it be on the list? This is a question that has been ignored far too long in the domain of research calling itself cognitive science

cover
โœ Sharon Moalem; Jonathan Prince ๐Ÿ“‚ Fiction ๐Ÿ“… 2007 ๐Ÿ› HarperCollins ๐ŸŒ English โš– 157 KB

### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug

cover
โœ Sharon Moalem ๐Ÿ“‚ Fiction ๐Ÿ“… 2007 ๐Ÿ› HarperCollins e-books ๐ŸŒ English โš– 157 KB

### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug

cover
โœ Sharon Moalem; Jonathan Prince ๐Ÿ“‚ Fiction ๐Ÿ“… 2007 ๐Ÿ› HarperCollins e-books ๐ŸŒ English โš– 157 KB

### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug