Kindle Notes & Highlights
Read between
November 21, 2015 - December 25, 2023
On the Contextual Security Architecture Layer, Business Users provide the business requirements that must be met by the architecture. At the Conceptual Security Architecture layer, an architect provides the overall context by which the business requirements of the organization are to be met. On the Logical Security Architecture layer, the Designers provide a systems engineering model which views the business as a system and delineates it in terms of a system of systems through various sub-systems. On the Physical Security Architecture layer, the builder provides physical security mechanisms
...more
Principle 1: Computer Security Supports the Mission of the Organization
Principle 2: Computer Security is an Integral Element of Sound Management
Principle 3: Computer Security Should Be Cost-Effective
Principle 4: Systems Owners Have Security Responsibilities Outside Their Own Organization
Principle 5: Computer Security Responsibilities and Accountability Should Be Made Explicit
Principle 6: Computer Security Requires a Comprehensive and Integrated Approach
Principle 7: Computer Security Should Be Periodically Reassessed
Principle 8: Computer Security is Constrained by Societal Factors
Possibility of forging the fingerprint by molding or fabricating it
It is advised that the users set the Bluetooth to off and enable it only when required.
Do not access secure websites using unsecured Wi-Fi connections. It is possible in such cases that your credentials are captured or sniffed by others.