The Science of Information Protection
Warren, Daniel F.
MetadataShow full item record
The presentation of Information Protection material can be improved in two important ways. First, if the material is arranged in a systematic/scientific fashion it can show how all the various pieces fit together and it can also demonstrate completeness by showing that all threats are addressed. Second, if each protection technique is preceded by a clear description of the threat that it addresses learning is significantly enhanced because the protection technique is motivated. This paper presents an information threat model that 1) arranges the material in a scientific/systematic fashion and 2) facilitates a threat-first presentation of Information Protection techniques.
Workshop on Education in Computer Security (WECS) 7
Showing items related by title, author, creator and subject.
Mortlock, Robert (Monterey, California. Naval Postgraduate School, 2017-07); NPS-AM-17-211This Enhanced Combat Helmet (ECH) case study encourages critical analysis of a U.S. Defense Department project at two key decision points: project start and production. The case centers on the development, testing, and ...
Nguyen, Thuy D.; Irvine, Cynthia E. (International Conference on Information Warfare and Security (ICIW 2008), April 2008, Omaha, Nebraska, USA, 2008-04-01);Success in information warfare will depend on resilient, reconstitutable cyber assets and the ability to assess and respond to attacks. A cornerstone of this success will be the ability of Information Assurance professionals ...
Donnelly, Timothy S. (Monterey, California. Naval Postgraduate School, 2012-03);What constitutes an effective Critical Infrastructure and Key Resources (CIKR) protection program for Massachusetts This study evaluates existing literature regarding CIKR to extrapolate an infrastructure protection role ...