Comments
SECURING INFORMATON SYSTEMS ASSETS
According to Sun Tzu, what two things must be achieved to adequately secure information system assets?
One must know who Sun Tzu is to understand why his methologies are still being used today in modern technology. Sun Tzu was a Chinese General, in th periods of 544–496 BC and strategist who is traditionally believed to have authored The Art of War, an influential ancient Chinese book on military strategy considered to be a prime example of Taoist thinking." (Swtornio & Jericho, 2010) His believe was that if you know yourself and enemy, and you know your assets are worth, you should know how to protect those assets from your enemy. “The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable."
According to Sun Tzu, what two things must be achieved to adequately secure information system assets?
One must know who Sun Tzu is to understand why his methologies are still being used today in modern technology. Sun Tzu was a Chinese General, in th periods of 544–496 BC and strategist who is traditionally believed to have authored The Art of War, an influential ancient Chinese book on military strategy considered to be a prime example of Taoist thinking." (Swtornio & Jericho, 2010) His believe was that if you know yourself and enemy, and you know your assets are worth, you should know how to protect those assets from your enemy. “The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable."
by Rtucker