The InfoSec Handbook: An Introduction to Information Security
Rate it:
Read between November 21, 2015 - December 25, 2023
15%
Flag icon
On the Contextual Security Architecture Layer, Business Users provide the business requirements that must be met by the architecture. At the Conceptual Security Architecture layer, an architect provides the overall context by which the business requirements of the organization are to be met. On the Logical Security Architecture layer, the Designers provide a systems engineering model which views the business as a system and delineates it in terms of a system of systems through various sub-systems. On the Physical Security Architecture layer, the builder provides physical security mechanisms ...more
Craig Nicol
Separation Of concerns
20%
Flag icon
Principle 1: Computer Security Supports the Mission of the Organization
20%
Flag icon
Principle 2: Computer Security is an Integral Element of Sound Management
20%
Flag icon
Principle 3: Computer Security Should Be Cost-Effective
20%
Flag icon
Principle 4: Systems Owners Have Security Responsibilities Outside Their Own Organization
20%
Flag icon
Principle 5: Computer Security Responsibilities and Accountability Should Be Made Explicit
20%
Flag icon
Principle 6: Computer Security Requires a Comprehensive and Integrated Approach
20%
Flag icon
Principle 7: Computer Security Should Be Periodically Reassessed
20%
Flag icon
Principle 8: Computer Security is Constrained by Societal Factors
75%
Flag icon
Biometric traits cannot be stolen or duplicated;
Craig Nicol
Fingerprints and a gummy bear beg to differ
76%
Flag icon
Seven major sources of physical loss have been identified
Craig Nicol
4 of which are exacerbated by climate change
76%
Flag icon
There have been instances of labor unions being used as a conduit by the competitors to create havoc on the premises of the target organization and physically damage the infrastructure.
Craig Nicol
Don't try and sell union-busting as infosec
77%
Flag icon
Voice Recognition: Voice patterns differ from person to person.
Craig Nicol
Defeated by voice modelling
77%
Flag icon
Fingerprint Biometrics:
Craig Nicol
I am a gummi bear
77%
Flag icon
Facial Biometrics:
Craig Nicol
Like iPhone face ID that can't tell apart different members of the same family?
77%
Flag icon
Some people have privacy reservations about this method.
Craig Nicol
Privacy reservations about facial recognition. I wonder why people are so precious about their coupon?
78%
Flag icon
Possibility of forging the fingerprint by molding or fabricating it
84%
Flag icon
It is advised that the users set the Bluetooth to off and enable it only when required.
85%
Flag icon
Do not access secure websites using unsecured Wi-Fi connections. It is possible in such cases that your credentials are captured or sniffed by others.