Information Security
Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 1)Publication Date: 2017-01-05
Authors : Asif Husain;
Page : 2358-2361
Keywords : INFORMATION SECURITY;
Abstract
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of crypto-graphic protocols, approved firewalls, better ways of detecting intrusions and malicious code, and better tools for system evaluation and assurance, the problems can be solved. In this note, we put forward a contrary view information insecurity is at least as much due to perverse incentives. Many of the problems can be explained more clearly and convincingly using the language of microeconomics network externalities, asymmetric information, moral hazard, adverse selection, liability dumping and the tragedy of the commons.
Other Latest Articles
- Medication Adherence among Type 2 Diabetes Mellitus Patients of a University Hospital, Riyadh, KSA
- Awareness of Osteoporosis among females, Eastern Province, KSA
- Impact of Fungicides on the Growth and Distribution of Soil Mycoflora in Agriculture Fields at Narasannapeta
- A Rare Cause of Intestinal Obstruction in Infants: Ileum Duplication Cyst
- Embryonic Sexing in Rabbits by Using Special Diet and Change of Vaginal PH
Last modified: 2021-06-30 17:35:27