Abstract
So far the discussion has been centred mainly on the various techniques one can employ to counter various security threats. Good security consists of rather more than the mere application of countermeasures. It is thought by many people that the answer to any security problem is to apply every available countermeasure. The supposed advantage of this approach is that it covers every eventuality.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Much of the content of this chapter uses material from an MSc dissertation by Captain Sean Hoag of the Canadian Army written as a part of his UK Army Staff Course studies.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag London
About this chapter
Cite this chapter
Hunter, J.M.D. (2001). The Management of Security. In: An Information Security Handbook. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-0261-8_15
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0261-8_15
Publisher Name: Springer, London
Print ISBN: 978-1-85233-180-1
Online ISBN: 978-1-4471-0261-8
eBook Packages: Springer Book Archive