Mailinglist Archive


Valuing Secure Access to Personal Information
From:Joe Klemmer
Date: Sun, 12 Sep 2004 07:30:45 -0400

Valuing Secure Access to Personal Information
by Ben Malisow
last updated August 19th, 2004

Securing data is not a simple endeavor; a multi-discipline,
defense-in-depth approach is necessary, as information can leak at any
point in the communication process, from receipt, through storage,
retrieval, transmission, and so on. Furthermore, each information system
element is vulnerable to loss, including hardware, software, and
personnel. Add to this the exceptional efforts made by those who want to
acquire information through illicit means, whether for espionage,
criminal, political, mischievous, or other intent...someone is always
trying gain access to information they shouldn't have.

http://www.securityfocus.com/infocus/1797

-- 
Joe Klemmer 
Unix System/Network Administrator & Ad Hoc Programmer