What makes a process a cognitive process? I'm not just asking for a list of cognitive processes, but for what makes an item on that list a cognitive process. Why should it be on the list? This is a question that has been ignored far too long in the domain of research calling itself cognitive science
Why we need a new definition of information security
โ Scribed by James M. Anderson
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 101 KB
- Volume
- 22
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
There is an old Peanuts strip where Charlie Brown says, "Working here is like wetting your pants in the pool, wearing a dark bathing suit. You get that warm feeling but nobody notices." Increasingly, I think computer security professionals in large enterprises are in that metaphorical swimming pool. In fact, many are swimming in the deep end without their water wings.
When computer security professionals do an excellent job protecting systems and information, the number of bad outcomes decreases. After a generation of peace, pretty soon people start asking why we need the army. I believe this problem stems in part from a fuzzy fundamental: the definition of information security.
What is information security? Is it, as one would have to conclude from a broad survey of published material, all about Confidentiality, Integrity and Availability (CIA)? There may be no one who says, "information security = CIA." Certainly, infosec=CIA cannot be true in the canonical sense. To measure infosec, one must measure the elements of CIA; measurements that are elusive. The bottom line is that we do not have generally accepted measurements of confidentiality, integrity and availability, other than the raw count of damaging incidents along with tenuous estimates of the damage. When the number of damaging incidents drops due to an effective infosec program, the measurement problem increases. No incidents means no 'before' and 'after' pictures and no measurable return from the avoidance of incidents. Make no mistake; big money is being spent on information security. IDC recently put the total at $17 billion annually in 2001 for infosec products and services in the US, growing to a projected $45 billion estimated by 2006 [1]. Many firms, especially large financial institutions, are spending upwards of 2% of total IT budgets directly on information security. As
๐ SIMILAR VOLUMES
### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug
### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug
### Amazon.com Review **Dan Ariely on *Survival of the Sickest*** MIT professor Dan Ariely has become one of the leaders in the growing field of behavioral economics, and his bestselling book debut, \_ I have always been puzzled by the way in which genetic diseases have managed to survive throug
runs the technical investigations and threat management unit for a major international bank and leads the bank's CSIRT function.