ABSTRACT

This chapter presents a fresh perspective on how the IS security mechanism should be organized and accomplished. It discusses the unique characteristics of the cyberspace computing environment and how those characteristics affect IS security problems. It describes three approaches to resolving those problems and analyzes the effectiveness of each.