My Photo

Your email address:


Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« When Risk Assessment is the Risk | Main | Hacking the 2008 UK Ironman: Kick to Kill »

September 28, 2008

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Jason Watkins

I like using the notion of perimeter. It starts from scratch, increases to a tipping point after which each new piece is decreasing the perimeter rather than increasing it and rapidly decreases. Software tends to be similar IMHO, not just with searching information but also programmer effort in using APIs. Designing software so that it has maximum utility with minimum perimeter is an ideal I aspire to.

Jigsaw Free

This happens because when the memory in the system is full (when it contains the most data in the middle) it will take the longest to process the data. I really like your comparison to a jigsaw puzzle, because that makes tons of sense.

GlobusProject

The puzzle, example is good.

It is simple Probability Theory.

As you add pieces of the puzzle, the probabilities of finding the
solution decreases based on exponential rate of growth of the solutions occurs. Until there is a finite point where the number of possible solutions starts decreasing, because there are only so many pieces of the puzzle left. Then the probability of solutions decrease at an exponential rate.

The series:

1/x
1/x*1/x
1/x*1/x*1/x
1/x*1/x*1/x*1/x
1/x*1/x*1/x*1/x*1/x.....infinity.

Then decreasing:

1/x*1/x*1/x*1/x*1/x
1/x*1/x*1/x*1/x
1/x*1/x*1/x
1/x*1/x*
1/x

Just speaking, Scientist to Scientist!!!

:-)

And this is why we need to build up Information Assurance teams
(Strategic Information Assurance Cybersecurity people) see my presentation!!! to handle all of the knowledge management teams. Information Assurance comprises: Governance, Risk Management, Auditing, Compliance and Counterintelligence- GRACC. These knowledge management people are not process management people as you normally find in Business, Government or the Military who generally think in a linear and logical manner.

Knowledge management people, such as programmers, mathematicians, scientists, auditors, statisticians, etc, are not linear thinkers. They jump from place to place rather than proceed from point to point in a logical manner. These two groups are managed differently. So it is important to put them under a Strategic Information Assurance (Cybersecurity) person who works in a more collaborative management style rather than in a command and control manner of management style.

g.


Thanks.

Respectfully,

Gary S. Elliott, M.S., PMP, NSA 4011
Information Systems Security Officer (ISSO- Former)
Project Manager Professional Certification (PMP)
National Security Agency (NSA/CNSS 4011)
Certification in Information Assurance

Washington, DC 20001
United States of America

Secured Digital: 202 657-5502
Private: [email protected]
----------------------------

The comments to this entry are closed.