ABSTRACT

To be effective, an information security/IA program must correspond to the reality of today’s technology: distributed processing; client/server applications; mobile code; integrated audio, video, image, and textual data; PLCs; ASICs; embedded systems; wireless communications; and, of course, the Internet. An integrated methodical approach is needed: one that is comprehensive in scope, encompassing safety, reliability, and security engineering. Information security/ IA is not just a software challenge; rather, it involves dynamic interactions within and among a multitude of hardware, software, telecommunications, and people.