How do they do it, asks the technician.
Why would they do it, asks the criminologist.
Considering motives is a great way to analyse potential abuse. What are the assets? What could make an adversary attempt to compromise the system?
If you run a bank, one answer is obvious. But people are not driven merely by financial gain. Revenge, power, politics, publicity, and let's not forget curiosity ("because I can"). The list goes on.
Get those assets and motives straightened out before calling the technician.
(some of) my events
- 2025-03-31--05-30 AI Ethics for Engineers (taking course, Örebro University)
- 2025-02-27--28 Riskbaserat arbetssätt (teaching course, Stockholm)
- 2025-01-09 Certifierad IT-arkitekt (guest lecturing, Stockholm)
- 2024-03-21--05-31 Teoribildning inom riskhantering (taking course, Karlstad University)
- 2024-01-31 Interviewed on the TPG Blog
2015-01-26
2015-01-05
trusting a system
In the best of worlds, we could all trust each other not to compromise security qualities of information - neither intentionally nor accidentally.
In the real world there is not sufficient trust in this regard. Instead, we need to implement protective measures to uphold sufficient information security. When we cannot trust other parties as much as we like to, we need to establish trust in our protective measures instead.
What does it mean to trust a system? How do we create and maintain such trust?
In the real world there is not sufficient trust in this regard. Instead, we need to implement protective measures to uphold sufficient information security. When we cannot trust other parties as much as we like to, we need to establish trust in our protective measures instead.
What does it mean to trust a system? How do we create and maintain such trust?
Subscribe to:
Posts (Atom)
20250101