Security Quarks and the Cookie Monster

In this entry we introduce a discussion about the evolution of security concepts, comparing it with the evolution of atomic theory.

If you liked this article, consider taking advanced ISMS training online via Udemy

Operational Definitions for Security

In this video we argue about the need for operational definitions in information security. From Wikipedia: "An '''operational definition''' is the application of operationalisation used in defining the terms of a process needed to determine the nature of an item or phenomenon and its properties such as duration, quantity, extension in space, chemical composition, etc. The procedures included in definitions should be repeatable by anyone or at least by peers. An example of operational definition of the term ''weight'' of an object, operationalised to a degree, would be the following: "weight is the numbers that appear when that object is placed on a weighing scale. According to it, the weight can be any of the numbers shown on the scale after, including the very moment the object is put on it. Clearly, the inclusion of the moment when one can start reading the numbers on the scale would make it more fully an operational definition. Nonetheless, it is still in contrast to those purely theoretical definitions.

If you liked this article, consider taking advanced ISMS training online via Udemy

Review of "The Black Swan", "Irrationality, the Enemy within" and "How to Measure Anything".

In my vlog I started talking about books that influenced the way I think about information security, like "The Black Swan", "Irrationality, the Enemy within" and "How to Measure Anything".

If you liked this article, consider taking advanced ISMS training online via Udemy

Pages

Subscribe to Information Security Management using O-ISM3 RSS