Passport please. Identity control! Today’s cryptography goes far beyond the protection of confidentiality and, in a smaller measure, integrity. In our virtual world you don’t really know who you are talking to. If someone has intercepted your encrypted message and…
2 ways to appreciate the risks
We’ve already seen that one of the ways to decide if the risks are acceptable or not is the value of information. Let me remind you that the value is computed on four dimensions: the intrinsic value: what it cost…
How the financial management tools help security…
We already saw that our Security Action Plan should contain solutions to cover important and urgent risks. According to the preponderance of the Potentiality of occurrence of risks or their Consequence, the most relevant solutions will be preventive, reactive or corrective…