Chapter 12

Information Security

Introduction

There is a wise saying in Tibet: “As a thing is viewed, so it appears.”

This is true of anything and everything. And it is an exhortation to intellectual honesty. Unless you can look beyond your own biases, they warp your perceptions. Indeed, unless you can achieve some clarity beyond your personal biases, they will defeat themselves in the pursuit of their primary purposes—your own best interests.

As information security is viewed, so it appears.

To a policy wonk, it may look like a robust body of well-crafted, well-calibrated policies and standards. To a technologist, it may look like an intricate web of sophisticated programs, schemes, and devices—trip wires, honey pots, firewalls, intrusion detection, ...

Get Secrets Stolen, Fortunes Lost now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.