Mailinglist Archive
| Valuing Secure Access to Personal Information
|
| From: | Joe Klemmer |
| Date: | Sun, 12 Sep 2004 07:30:45 -0400
|
Valuing Secure Access to Personal Information
by Ben Malisow
last updated August 19th, 2004
Securing data is not a simple endeavor; a multi-discipline,
defense-in-depth approach is necessary, as information can leak at any
point in the communication process, from receipt, through storage,
retrieval, transmission, and so on. Furthermore, each information system
element is vulnerable to loss, including hardware, software, and
personnel. Add to this the exceptional efforts made by those who want to
acquire information through illicit means, whether for espionage,
criminal, political, mischievous, or other intent...someone is always
trying gain access to information they shouldn't have.
http://www.securityfocus.com/infocus/1797
--
Joe Klemmer
Unix System/Network Administrator & Ad Hoc Programmer