Page 9 - index
P. 9
RESEARCH, ANALYSIS & TRENDS




4. Ethics: Participants should respect the legiti- 9. Reassessment: Participants should review and
mate interests of others. reassess the security of information systems and
networks, and make appropriate modifications to
5. Democracy: The security of information sys- security policies, practices, measures and proce-
tems and networks should be compatible with es- dures.
sential values of a democratic society.
Even if we try to make the best of it, the Internet is and
6. Risk assessment: Participants should conduct will probably always be an unsafe medium. The eupho-
risk assessments. ria about its possibilities, its global data exchange, and
the huge potential of abuses makes it dangerous. In-
7. Security design and implementation: Partici- tegrity by default is needed for the sake of security. We
pants should incorporate security as an essential all know that by now and should act accordingly.◊

element of information systems and networks. By Daniela La Marca

8. Security management: Participants should
adopt a comprehensive approach to security man-
agement.

































































MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   4   5   6   7   8   9   10   11   12   13   14