Uncovering Assumptions in Information Security

The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures...

Full description

Bibliographic Details
Main Authors: Armstrong, Helen, Bishop, M.
Format: Conference Paper
Published: Moscow Engineering Physics Institute (State University), Russia 2005
Subjects:
Online Access:http://www.ifip.org/home.html
http://hdl.handle.net/20.500.11937/37157
_version_ 1848754969756303360
author Armstrong, Helen
Bishop, M.
author_facet Armstrong, Helen
Bishop, M.
author_sort Armstrong, Helen
building Curtin Institutional Repository
collection Online Access
description The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented.
first_indexed 2025-11-14T08:48:51Z
format Conference Paper
id curtin-20.500.11937-37157
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T08:48:51Z
publishDate 2005
publisher Moscow Engineering Physics Institute (State University), Russia
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-371572017-02-27T15:15:30Z Uncovering Assumptions in Information Security Armstrong, Helen Bishop, M. assumptions information security education lateral thinking The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures implemented to protect against violation ofthe assumptions. A number of examples in the context of teaching computer security arediscussed and some methods of teaching awareness of assumptions presented. 2005 Conference Paper http://hdl.handle.net/20.500.11937/37157 http://www.ifip.org/home.html Moscow Engineering Physics Institute (State University), Russia fulltext
spellingShingle assumptions
information security education
lateral thinking
Armstrong, Helen
Bishop, M.
Uncovering Assumptions in Information Security
title Uncovering Assumptions in Information Security
title_full Uncovering Assumptions in Information Security
title_fullStr Uncovering Assumptions in Information Security
title_full_unstemmed Uncovering Assumptions in Information Security
title_short Uncovering Assumptions in Information Security
title_sort uncovering assumptions in information security
topic assumptions
information security education
lateral thinking
url http://www.ifip.org/home.html
http://hdl.handle.net/20.500.11937/37157