Uncovering Assumptions in Information Security
The design and implementation of security is based upon many assumptions. This paper discusses the need for students to learn to question assumptions, and in so doing identify unrealistic or incorrect assumptions and any associated policies. More realisticassumptions can then made and/or procedures...
| Main Authors: | Armstrong, Helen, Bishop, M. |
|---|---|
| Format: | Conference Paper |
| Published: |
Moscow Engineering Physics Institute (State University), Russia
2005
|
| Subjects: | |
| Online Access: | http://www.ifip.org/home.html http://hdl.handle.net/20.500.11937/37157 |
Similar Items
The Causes and Consequences of Differing Pensions Accounting Assumptions in UK Pension Schemes
by: Thomas, Gareth
Published: (2006)
by: Thomas, Gareth
Published: (2006)
Influence Of Personal Preferred Creative Problem-Solving Style And Organisational Creativity Factors On Types Of Lateral Thinking
by: Ow, Alex Chee Kin
Published: (2009)
by: Ow, Alex Chee Kin
Published: (2009)
The impact of loss function assumptions in rational expectations tests on the efficiency of financial analysts' earnings forecasts
by: Su, Haochen
Published: (2008)
by: Su, Haochen
Published: (2008)
A note on the relationship between the isotone assumption of the Abian-Brown fixed point theorem and Abian’s most basic fixed point theorem
by: Luckraz, Shravan
Published: (2014)
by: Luckraz, Shravan
Published: (2014)
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)
by: Armstrong, Helen
Published: (2011)
A soft approach to management of information security.
by: Armstrong, Helen
Published: (1999)
by: Armstrong, Helen
Published: (1999)
Reaching today's information security students
by: Armstrong, Helen, et al.
Published: (2009)
by: Armstrong, Helen, et al.
Published: (2009)
Applying the ‘least dangerous assumption’ in regard to behaviour policies and children with special needs
by: Emerson, Anne
Published: (2016)
by: Emerson, Anne
Published: (2016)
A Course Applying Network Analysis to Organizational Risk in Information Security
by: Armstrong, Helen, et al.
Published: (2010)
by: Armstrong, Helen, et al.
Published: (2010)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Security and quality issues in IT projects
by: El Desouki, Hassan, et al.
Published: (2010)
by: El Desouki, Hassan, et al.
Published: (2010)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
An approach to visualising information security knowledge
by: Armstrong, Colin
Published: (2011)
by: Armstrong, Colin
Published: (2011)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Resubmit my Information Security Thesis? - You must be joking!
by: Armstrong, Helen, et al.
Published: (2007)
by: Armstrong, Helen, et al.
Published: (2007)
Initial Soil Springs Stiffness for laterally loaded Piles
by: Bahrami, Amir, et al.
Published: (2012)
by: Bahrami, Amir, et al.
Published: (2012)
Identification of the human factors contributing to maintenance failures in a petroleum operation
by: Antonovsky, Ari, et al.
Published: (2014)
by: Antonovsky, Ari, et al.
Published: (2014)
CNSS Mapping for IA lab exercises
by: Dodge, R., et al.
Published: (2009)
by: Dodge, R., et al.
Published: (2009)
The development of a measurement system for water-energy-food (WEF) security Nexus in Malaysia: wellbeing, sectoral balance and sustainable development
by: Tan, Andrew Huey Ping
Published: (2018)
by: Tan, Andrew Huey Ping
Published: (2018)
Discretion in accounting for pensions under IAS 19: using the ‘magic telescope’?
by: Billings, Mark, et al.
Published: (2016)
by: Billings, Mark, et al.
Published: (2016)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Incident-centered information security: Managing a strategic balance between prevention and response
by: Baskerville, Richard, et al.
Published: (2014)
by: Baskerville, Richard, et al.
Published: (2014)
Genetic dissection of auxin regulated root development
by: Rashed, Afaf Abdullah
Published: (2017)
by: Rashed, Afaf Abdullah
Published: (2017)
An Investigation into what factors influence the expectation of life made by life insurance companies.
by: Anand, Aniel
Published: (2006)
by: Anand, Aniel
Published: (2006)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Geography interactive map integrated to spatial element in assessing student cognitive levels / Nurul Syazwani Syafiqah Mohamad Zubir
by: Mohamad Zubir, Nurul Syazwani Syafiqah
Published: (2020)
by: Mohamad Zubir, Nurul Syazwani Syafiqah
Published: (2020)
Relationship between integrated living skills teachers’ creative characteristics and school creative climate with their critical and creative thinking teaching practices
by: Vejian, Gajathiswari
Published: (2014)
by: Vejian, Gajathiswari
Published: (2014)
Investigating students’ perception towards economics education / Azniza Ahmad Zaini, Roslilee Abdul Halim and Zulkifli Ab. Ghani Hilmi
by: Abdul Halim, Roslilee, et al.
Published: (2008)
by: Abdul Halim, Roslilee, et al.
Published: (2008)
Assessing the Relationship between Psychosocial Learning Environment and Higher Order Thinking Skills / Mohd Azry Abdul Malik ...[et al.]
by: Abdul Malik, Mohd Azry, et al.
Published: (2016)
by: Abdul Malik, Mohd Azry, et al.
Published: (2016)
Revisiting thinking curriculum / Bawani Selvaraj
by: Bawani, Selvaraj
Published: (2011)
by: Bawani, Selvaraj
Published: (2011)
Pengaruh konsep kendiri akademik sebagai moderator terhadap persekitaran dan strategi pembelajaran dengan kemahiran berfikir aras tinggi murid perakaunan
by: Jamaluddin, Nor Sa'adah
Published: (2020)
by: Jamaluddin, Nor Sa'adah
Published: (2020)
Hubungan antara disposisi pemikiran kritis dengan sikap, persepsi dan efikasi secara pengajaran koperatif dalam kalangan guru pendidikan khas integrasi
by: Kuppusamy, Suresh Kumar
Published: (2016)
by: Kuppusamy, Suresh Kumar
Published: (2016)
Permodelan teori kabur dalam pembuatan keputusan multi kriteria: Kajian kes di UiTM Pahang / Nazirah Ramli and Nor Azizah Md Yaacob
by: Ramli, Nazirah, et al.
Published: (2008)
by: Ramli, Nazirah, et al.
Published: (2008)
How many testers are needed to assure the usability of medical devices?
by: Borsci, Simone, et al.
Published: (2014)
by: Borsci, Simone, et al.
Published: (2014)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Similar Items
-
The Causes and Consequences of Differing Pensions Accounting Assumptions in UK Pension Schemes
by: Thomas, Gareth
Published: (2006) -
Influence Of Personal Preferred Creative Problem-Solving Style And Organisational Creativity Factors On Types Of Lateral Thinking
by: Ow, Alex Chee Kin
Published: (2009) -
The impact of loss function assumptions in rational expectations tests on the efficiency of financial analysts' earnings forecasts
by: Su, Haochen
Published: (2008) -
A note on the relationship between the isotone assumption of the Abian-Brown fixed point theorem and Abian’s most basic fixed point theorem
by: Luckraz, Shravan
Published: (2014) -
Two Approaches to Information Security Doctoral Research
by: Armstrong, Helen
Published: (2011)