After spending some time socializing with people on issues of computer security WRT programming and Systems Engineering, I found each person had their own methods for understanding security in their own way. Obviously, methods reflected their own experiences.
Would you care to offer what metaphor has best helped you to understand various topics of InfoSec/CompSec? What symbolism seems to work well for you? What methods work well in educating others?
Some results from this discussion included:
* Mental diagrams with Finite State Machines to show all logical states and transition/edges (popular with people who have strong foundations in Graph Theory/Set Theory or math in CS)
* Model topics in Security and examine how tings tend to fit in one category or another, and how there is border interaction at the interfaces (various partitions spaces such as Applications, Kernel, Physical Access, Users)
* Examination of any space by applying Sun Tzu's The Art of War and various grounds of contention from the point of view of an attacker vs. defender
(more than what are listed, of course)
I've used some of these as well as others which are not listed. What works or has worked for you? What methods do you use to describe issues of CompSec/InfoSec to people who do not need to know the details, but want general guidelines for layer 8 policy (or layer 9 if you populate layer 8 with money and 9 with politics.)
TIA
(Was posting here as "TheOtherGuy" but to show how "31337" (elite) I am, I forgot the password to it, and seem to have botched the entry of my e-mail address in my initial application here, so I am born again as this ID: Yes, I suck. But I know it.)
Would you care to offer what metaphor has best helped you to understand various topics of InfoSec/CompSec? What symbolism seems to work well for you? What methods work well in educating others?
Some results from this discussion included:
* Mental diagrams with Finite State Machines to show all logical states and transition/edges (popular with people who have strong foundations in Graph Theory/Set Theory or math in CS)
* Model topics in Security and examine how tings tend to fit in one category or another, and how there is border interaction at the interfaces (various partitions spaces such as Applications, Kernel, Physical Access, Users)
* Examination of any space by applying Sun Tzu's The Art of War and various grounds of contention from the point of view of an attacker vs. defender
(more than what are listed, of course)
I've used some of these as well as others which are not listed. What works or has worked for you? What methods do you use to describe issues of CompSec/InfoSec to people who do not need to know the details, but want general guidelines for layer 8 policy (or layer 9 if you populate layer 8 with money and 9 with politics.)
TIA
(Was posting here as "TheOtherGuy" but to show how "31337" (elite) I am, I forgot the password to it, and seem to have botched the entry of my e-mail address in my initial application here, so I am born again as this ID: Yes, I suck. But I know it.)
Comment