Information security

0Citations
Citations of this article
209Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the field of information security, it is commonly accepted that security belongs at the lowest possible level of the processing stack [1]. If affirmative, one might ask, why is the issue of application security even being considered? Applications, after all, sit at the very top of the stack. The analog of a house built on a firm foundation is well known and easily understood. If he foundation is unsound, no structure will stand on it for too long. What is less well understood is that the converse is equally true. No matter how strong the foundation, where the house erected on the foundation is flimsy, the overall structure is unsound. The same is true with information security. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Stanley, R. (2010). Information security. In Cybercrimes: A Multidisciplinary Analysis (pp. 95–126). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-13547-7_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free