DocumentCode :
1178299
Title :
The weakest link revisited [information security]
Author :
Arce, Irwin
Author_Institution :
Core Security Technologies
Volume :
1
Issue :
2
fYear :
2003
Firstpage :
72
Lastpage :
76
Abstract :
It is a common saying that a chain is only as strong as its weakest link-a phrase information security officers, IT managers, consultants, researchers, journalists, and opinion makers reiterate ad nauseam when referring to an organization´s information security posture. Most in the information security community would agree that a security architecture is only as strong as its weakest link. However, they usually cannot agree on what that is, and no expert risks making a definite statement about it. We can argue that a security strategy´s weakest component will vary from one organization to in other but perhaps we should compare past perceptions of what a weakest link is to what it could well be in the near future.
Keywords :
DP management; authorisation; computer networks; security of data; exploit research indicator; human factor; information security community; information security posture; security architecture; vulnerability indicator; Access control; Communication system security; Computer security; Control systems; Government; Hardware; Information security; Military computing; Operating systems; Personal communication networks;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSECP.2003.1193216
Filename :
1193216
Link To Document :
بازگشت