Cyber Attacks by Edward Amoroso

Cyber Attacks by Edward Amoroso

Author:Edward Amoroso
Language: eng
Format: epub, pdf
ISBN: 9780123918673
Publisher: Elsevier Science
Published: 2012-02-27T05:00:00+00:00


Figure 7.1 Size comparison issues in a trusted computing base.

A major consideration in the protection of national infrastructure thus becomes how to manage, promote, and ensure proper human discretion around critical information related to TCB assets. This requires that policies, procedures, and even functional controls be put in place to assist in exercising such discretion. The idea is that, before any TCB-related information is disclosed that could have an impact on the security of some national asset, the following types of questions must be considered:

Asking the right questions can help determine the impact of TCB security-related disclosures.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.