ABSTRACT

As we continue to learn more about the discipline of information securityor should we call it “securing information”?—I’ll be interjecting a few quotes and

Contents 13.1 Introduction .............................................................................................149 13.2 Filling the Pipe with New Smoke: Why Security? .................................... 151 13.3 Managing Risk in Today’s World of Rapidly Changing Threats ...............154 13.4 Sample Steps in a Typical Assessment.......................................................158 13.5 Learning How to Enjoy the Pipe: Effective Security Awareness ................160