ABSTRACT

This chapter examines the role of information sharing within the critical information protection and critical infrastructure assurance domains. The key barriers to information sharing come from a lack of trust and teamwork between the government, industry, and academic parties. When approaching the issue of information sharing, one needs to understand the difference between data, information, and intelligence. While the data and information collected on an individual is relevant during the background screening, it also has an expiration date that can be tied to the exposure of the individual to various sources of threat and different circumstances. As with other information, the context in which it organized the data needs to be understood. Within certain clouds, data may be held in multiple jurisdictions. The integration of the cloud into the computing base will simply be an amplification of this principle. Identifying the cloud as a concealed conduit may be of some value to the protection or assurance practitioner.