Alexandre CABROL PERALES
2011-01-23 14:58:06 UTC
This topic is already opened.
But i would like to relocate this discussion.
Before start to define how to protect an information system we have to
talk about:
* which method we will use to secure the system
* what is the scope
* what is the risk assesment
More over technical solutions are not enougth.
I can take as example Tor project which has to practice awareness on
usage of it's network. Tor main security issue is social engineering
like phishing.
But i would like to relocate this discussion.
Before start to define how to protect an information system we have to
talk about:
* which method we will use to secure the system
* what is the scope
* what is the risk assesment
More over technical solutions are not enougth.
I can take as example Tor project which has to practice awareness on
usage of it's network. Tor main security issue is social engineering
like phishing.