Eric Goldman

Eric Goldman

Securing Computers and Humans
…almost done with that

  • About Me
  • All Articles
  • Categories / Tags
  • YouTube
  • SlideShare
  • Stack Exchange
  • Github

Articles in the tag: Proactive security

You can also filter articles by category or tag.

 

Building Security into System Design

Hale argues that information systems need to be designed with security as a primary factor. He starts the article be emphasizing the number of attacks and their related costs. He notes it is relatively inexpensive to hack any given enterprise which is specifically targeted by skilled hackers, who are always a step ahead of the security researchers and patch writers. He notes that in general, systems are not designed with security in mind, and as a result…

5 Feb 2009   ::   Security   ::   #proactive security #vendor responsibility #network security #enterprise security

A Look at Insider Threats

…while insider attacks are not new, the proliferation of information systems increases the number of people who have access to valuable data. Thus, this significantly increases the number of individuals who may possibly steal information assets. Mr. Reilly notes that the recent economic downturn may be a strong motivator for individuals to commit information theft. White collar professionals may have access to valuable information and can easily find a black market customer via the Internet. Furthermore, there is a much higher level of risk from insiders as they do not have to be technically sophisticated hackers to steal a valuable asset…

20 Jan 2009   ::   Security   ::   #insider #employee monitoring #privacy #proactive security
  Page 1 of 1  

 

  • © Eric H Goldman. All rights reserved.
  • Design: HTML5 UP
Unless otherwise stated, all code samples on this site are released under the GPL v2 or later license. Unless otherwise stated, all opinions are my own and do not reflect those of any current or past employer or client.