Uncovering Assumptions in Information Security

The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures...

Full description

Bibliographic Details
Main Authors: Armstrong, Helen, Bishop, M.
Format: Conference Paper
Published: Moscow Engineering Physics Institute (State University), Russia 2005
Subjects:
Online Access:http://www.ifip.org/home.html
http://hdl.handle.net/20.500.11937/37157
Description
Summary:The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented.