Posted on

Are We Living in a Simulated Reality?

According to some theorists, we are living in a simulated reality. This theory is based on the idea that the world we experience is nothing more than a computer simulation. Furthermore, some scientists believe that an advanced civilization could create this simulation. We spend so much time inside computers and phones that it’s hard to…

Read more

Posted on

Why multiple identities are closer than you think

Identities are complex to form, hard to define and increasingly easier to steal and fake. Author Tracey Follows explains how will we define ourselves and what happens to our legacy identities as they drift through time and space?30 March 2022DOWNLOADDownload the full What the Future:Identity issueThe central question of this issue is how we will…

Read more

Posted on 17 Comments

Information security

1Definition2Overview2.1Threats2.1.1Responses to threats3History4Basic principles4.1Key concepts4.1.1Confidentiality4.1.2Integrity4.1.3Availability4.1.4Non-repudiation5Risk management5.1Security controls5.1.1Administrative5.1.2Logical5.1.3Physical5.2Defense in depth5.3Security classification for information5.4Access control5.4.1Identification5.4.2Authentication5.4.3Authorization5.5Cryptography6Process6.1Security governance6.2Incident response plans6.2.1Preparation6.2.2Identification6.2.3Containment6.2.4Eradication6.2.5Recovery6.2.6Lessons Learned6.3Change management7Business continuity8Laws and regulations9Information security culture10Sources of standards11See also12References13Further reading13.1Bibliography14External links Definition Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information security…

Read more