ABSTRACT

The art and science of security requires a complete understanding of the value of the assets requiring protection. The asset under scrutiny is primarily the information transmitted, stored, and processed by the organization. Secondarily, the computer and telecommunications resources themselves require protection; a significant component of that can and will be addressed by applying of the McCumber Cube approach.