The Science of Information Protection
Warren, Daniel F.
MetadataShow full item record
The presentation of Information Protection material can be improved in two important ways. First, if the material is arranged in a systematic/scientific fashion it can show how all the various pieces fit together and it can also demonstrate completeness by showing that all threats are addressed. Second, if each protection technique is preceded by a clear description of the threat that it addresses learning is significantly enhanced because the protection technique is motivated. This paper presents an information threat model that 1) arranges the material in a scientific/systematic fashion and 2) facilitates a threat-first presentation of Information Protection techniques.
Workshop on Education in Computer Security (WECS) 7
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Nguyen, Thuy D.; Irvine, Cynthia E. (International Conference on Information Warfare and Security (ICIW 2008), April 2008, Omaha, Nebraska, USA, 2008-04-01);Success in information warfare will depend on resilient, reconstitutable cyber assets and the ability to assess and respond to attacks. A cornerstone of this success will be the ability of Information Assurance professionals ...
Gregor, Dusan (Monterey, CA; Naval Postgraduate School, 2020-06);The foremost task of every military is to win the nation’s wars and protect its freedom, independence, and territorial integrity. Today, great powers are fielding powerful combined-arms militaries capable of operating in ...
Donnelly, Timothy S. (Monterey, California. Naval Postgraduate School, 2012-03);What constitutes an effective Critical Infrastructure and Key Resources (CIKR) protection program for Massachusetts This study evaluates existing literature regarding CIKR to extrapolate an infrastructure protection role ...