Issue No.03 - May/June (2010 vol.8)
Edward B. Talbot , Sandia National Laboratories, California
Deborah Frincke , the Pacific Northwest National Laboratory
Matt Bishop , University of California, Davis
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.95
This article looks at four cybersecurity myths that recur in both popular literature and technical work: "more layers of defense are always better than fewer," "running my executables on my data on my system is secure because I control my system," "effective security is burdensome," and "trusted computing eliminates the need to trust people."
cybersecurity, security and privacy, layered defense, defense in depth, system complexity, three-factor authentication, trusted computing, computer security, computer science education
Edward B. Talbot, Deborah Frincke, Matt Bishop, "Demythifying Cybersecurity", IEEE Security & Privacy, vol.8, no. 3, pp. 56-59, May/June 2010, doi:10.1109/MSP.2010.95