Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
143
6
Th e eT e r n a l Ya w n :
Ca r e e r s in in f o r m a T i o n
se C u r i T Y
us far, I have spoken of the old and new skill sets in security.
e Hacker was the typical security analyst of the late 1990s era,
as described in Chapter 2. In Chapter 3, I introduced the checklists
and standards evangelist (CASE) paradigm—and it was this phe-
nomenon that replaced the Hacker ethic in security service provision
and end-user information risk management. e CASE is a skill set
as deployed in security today. It can be technically oriented in that
they do have IT skills, but the actual practices of modern-day security
departments are mostly nontechnical in nature.
In this chapter, I analyze some of the motivations people have for
getting in
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355