Uncovering Assumptions in Information Security
The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures...
| Main Authors: | , |
|---|---|
| Format: | Conference Paper |
| Published: |
Moscow Engineering Physics Institute (State University), Russia
2005
|
| Subjects: | |
| Online Access: | http://www.ifip.org/home.html http://hdl.handle.net/20.500.11937/37157 |
| _version_ | 1848754969756303360 |
|---|---|
| author | Armstrong, Helen Bishop, M. |
| author_facet | Armstrong, Helen Bishop, M. |
| author_sort | Armstrong, Helen |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented. |
| first_indexed | 2025-11-14T08:48:51Z |
| format | Conference Paper |
| id | curtin-20.500.11937-37157 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T08:48:51Z |
| publishDate | 2005 |
| publisher | Moscow Engineering Physics Institute (State University), Russia |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-371572017-02-27T15:15:30Z Uncovering Assumptions in Information Security Armstrong, Helen Bishop, M. assumptions information security education lateral thinking The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented. 2005 Conference Paper http://hdl.handle.net/20.500.11937/37157 http://www.ifip.org/home.html Moscow Engineering Physics Institute (State University), Russia fulltext |
| spellingShingle | assumptions information security education lateral thinking Armstrong, Helen Bishop, M. Uncovering Assumptions in Information Security |
| title | Uncovering Assumptions in Information Security |
| title_full | Uncovering Assumptions in Information Security |
| title_fullStr | Uncovering Assumptions in Information Security |
| title_full_unstemmed | Uncovering Assumptions in Information Security |
| title_short | Uncovering Assumptions in Information Security |
| title_sort | uncovering assumptions in information security |
| topic | assumptions information security education lateral thinking |
| url | http://www.ifip.org/home.html http://hdl.handle.net/20.500.11937/37157 |