Life at 6700'

Life notes and ideas from a security pro who lives in the mountains and does a lot of cycling, skiing, dirt biking, writing, coding, and thinking. Twitter @k3strel

Sunday, March 16, 2014

Information Security Explained in One Simple Diagram

Assets motivate adversaries to exercise threat realized through attack vectors against assets. Controls protect assets and reduce exposure to threat by counteracting attack vectors.


Posted by Kelly
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: information security, infosec, Threat Analysis
Newer Post Older Post Home

Search This Blog

Popular Posts

  • How to Construct a Threat Statement
  • Cybercrime in the 1990s
  • Research Paper - The Rise of Cybercrime 1970s - 2010
  • Cybercrime in the 1980s
  • Information Security as Counterinsurgency
  • Questioning Information Security - You are only as good as your questions
  • Questioning Information Security: A couple of examples
  • Paper - The Best of the 2014 InfoSec Threat Reports
  • What Ender's Game Teaches About Information Security
  • Threat Agent Profile: Payment Card Data Thieves and Stolen Card Markets

Blog Archive

  • ►  2022 (1)
    • ►  October (1)
  • ►  2015 (1)
    • ►  February (1)
  • ▼  2014 (44)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (2)
    • ►  July (1)
    • ►  June (4)
    • ►  May (3)
    • ►  April (3)
    • ▼  March (4)
      • Temple Mountain Moto
      • Information Security Explained in One Simple Diagram
      • How to Construct a Threat Statement
      • Threat Agent Profile: Government Cyber Warfare
    • ►  February (7)
    • ►  January (14)
  • ►  2013 (6)
    • ►  December (6)

Favorite Consulting Firms

  • Stratum Security
  • Net-Square
© Kelly White 2013. Simple theme. Powered by Blogger.