Issue No. 03 - May/June (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.95
Edward B. Talbot , Sandia National Laboratories, California
Deborah Frincke , the Pacific Northwest National Laboratory
Matt Bishop , University of California, Davis
This article looks at four cybersecurity myths that recur in both popular literature and technical work: "more layers of defense are always better than fewer," "running my executables on my data on my system is secure because I control my system," "effective security is burdensome," and "trusted computing eliminates the need to trust people."
cybersecurity, security and privacy, layered defense, defense in depth, system complexity, three-factor authentication, trusted computing, computer security, computer science education
Edward B. Talbot, Deborah Frincke, Matt Bishop, "Demythifying Cybersecurity", IEEE Security & Privacy, vol. 8, no. , pp. 56-59, May/June 2010, doi:10.1109/MSP.2010.95