Talk With an Expert

Pockets of Chaos: Management Theory for the Process of Computer Security

Pockets of Chaos: Management Theory for the Process of Computer Security (PDF, 1.82MB)Published: 12 Nov, 2001
Created by
Jason Collins

The security process is often described as being layered. Some layers are designed to protect, some to detect and others offer fail-safes. The most secure systems are the ones built with security in mind from the ground up. However, more often than not, we are forced to address security as an afterthought. This paper discusses Computer Security as an ongoing journey, not simply a destination and outlines a flexible security framework that manages 'pockets of chaos' to better help organizations achieve their security goals.