A proposed model for explaining and educating Information and Computer Security principles

نویسندگان

  • Hendrik Visagè
  • Martin Olivier
چکیده

Most of the current Information and Computer Security (ICS) literature and research, appears to be following a traditional model of first addressing the technological and technical issues, and assuming that these issues will be augmented by humans. This is evident in the proliferation of security devices and software in our daily lives. Though we still have ICS problems. However, authors like Von Solms come back to the question, though in different degrees, of whether the involvement of humans is sufficiently addressed. The problem is that the elements of ICS are not correctly addressed in the right order to make ICS work properly. This paper presents a model that gives an alternative perspective on the different elements of ICS. This model was developed while the author were doing ICS-related work, and it borrows insights from Maslow’s hierarchy of human needs and desires, where there are certain needs that have to be satisfied before the desires can be achieved. Using this idea that the bottom layers have to be satisfied or addressed before the upper layers should be considered, a layered pyramid has been developed as a model to be used in ICS. It is suggested that this model is a useful tool to help managers, computer professionals and users, get a better perspective on and understanding of ICS-related issues.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

متن کامل

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

The Application of Combined Fuzzy Clustering Model and Neural Networks to Measure Valuably of Bank Customers

Currently, acquisition of resources in banks is subject to attraction of the resources of banking customers. Meanwhile, the Bank’s valuable customers are one of the best resources to make profit for banks. Several different models are introduced for evaluation of profitability of the customers; but most of them are classical models and they are unable to evaluate the customers in complete and o...

متن کامل

The Application of Combined Fuzzy Clustering Model and Neural Networks to Measure Valuably of Bank Customers

Currently, acquisition of resources in banks is subject to attraction of the resources of banking customers. Meanwhile, the Bank’s valuable customers are one of the best resources to make profit for banks. Several different models are introduced for evaluation of profitability of the customers; but most of them are classical models and they are unable to evaluate the customers in complete and o...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010