Information Security

    Date11 Dec 2006
    Posted ByBrittany Day
    Consumers of the global service we call the Information security breaches come in the forms of passive and intrusive attacks. The author establishes to what degree consumers are responsible for the protection of their own information as opposed to the entities that have been established to provide secure services across the Internet. The author shows that protection can only be accomplished through the education of information security managers on existing testing procedures that comply with establish laws combined with the education of consumers on security practices that mitigate the accidental release, or intentional breach, of restricted information. The target population of this paper is information security undergraduate students and graduate students.

    LinuxSecurity Poll

    What is your favorite feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350


    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.