O'Reilly logo

The Security Consultant's Handbook by Richard Bingley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5: INFORMATION SECURITY

5.1 Context

“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image.” – Professor Stephen Hawking, theoretical physicist and author.

Information is precious and we should guard it well. For example, while writing this chapter I knocked on an elderly neighbour’s door only to discover a post-it note stuck to the porch window: “Dear Postman, I am not at home today. Please leave the parcel I’m expecting at the depot”.

This chapter will therefore examine threats to one of our most critical types of asset: information. An employee’s ability to readily access any necessary ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required