Posted on

Non-Player Character (NPC) Theory: A Detailed Explanation

Non-Player Character (NPC) theory, while rooted in video game terminology, has evolved into a complex concept with implications in online culture, social psychology, and even philosophical discussions about consciousness and agency. Here’s a breakdown: 1. Core Concept: From Video Games to Reality Video Game Origin: In video games, an NPC is a character not controlled…

Read more

Posted on

Framework for the Metaverse

I first wrote about the Metaverse in 2018, and overhauled my thinking in a January 2020 update: The Metaverse: What It Is, Where to Find it, Who Will Build It, and Fortnite. Since then, a lot has happened. COVID-19 forced hundreds of millions into Zoomschool and remote work. Roblox became one of the most popular…

Read more

Posted on 17 Comments

Information security

1Definition2Overview2.1Threats2.1.1Responses to threats3History4Basic principles4.1Key concepts4.1.1Confidentiality4.1.2Integrity4.1.3Availability4.1.4Non-repudiation5Risk management5.1Security controls5.1.1Administrative5.1.2Logical5.1.3Physical5.2Defense in depth5.3Security classification for information5.4Access control5.4.1Identification5.4.2Authentication5.4.3Authorization5.5Cryptography6Process6.1Security governance6.2Incident response plans6.2.1Preparation6.2.2Identification6.2.3Containment6.2.4Eradication6.2.5Recovery6.2.6Lessons Learned6.3Change management7Business continuity8Laws and regulations9Information security culture10Sources of standards11See also12References13Further reading13.1Bibliography14External links Definition Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security…

Read more