The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2010 vol. 8)
ISSN: 1540-7993
pp: 56-59
Edward B. Talbot , Sandia National Laboratories, California
Deborah Frincke , the Pacific Northwest National Laboratory
Matt Bishop , University of California, Davis
This article looks at four cybersecurity myths that recur in both popular literature and technical work: "more layers of defense are always better than fewer," "running my executables on my data on my system is secure because I control my system," "effective security is burdensome," and "trusted computing eliminates the need to trust people."
cybersecurity, security and privacy, layered defense, defense in depth, system complexity, three-factor authentication, trusted computing, computer security, computer science education

D. Frincke, M. Bishop and E. B. Talbot, "Demythifying Cybersecurity," in IEEE Security & Privacy, vol. 8, no. , pp. 56-59, 2010.
92 ms
(Ver 3.3 (11022016))