Viewing posts tagged Security and Economics
punishment-and-security
Posted by: admin 16 years, 1 month ago
There is a very article in the NY Times about how groups can profit by punishing members, in particular, by punishing free riders.
In the experiment, investigators at the University of Erfurt in Germany enrolled 84 students in the investment game and gave them 20 tokens apiece to start. In each round of the game, every participant decided whether to hold on to the tokens or invest some of them in a fund whose guaranteed profit was distributed equally among all members of the group, including the "free riders" who sat on their money. Because the profit was determined by a multiple of the tokens invested, each participant who contributed to the fund enjoyed less of a return than if the free riders had done so as well.
response-to-responses-incentive-plans-for
Posted by: admin 16 years, 1 month ago
My recent (assumption laden and simplistic) post on incentive plans for an information security team was picked up by Adam and subsequently poked at by mordaxus and then piled on by Mike Rothman.
perception-of-information-security-wealth-and
Posted by: admin 16 years, 1 month ago
Great post on Not Bad for a Cubicle about the utility of information security.security-and-oil
Posted by: admin 16 years, 1 month ago
I've been reading The Prize by Daniel Yergen. I've wanted to read it for quite some time and just ran across a copy at a yard sale. It is excellent. I'm about half-way through.
security-through-lingual-obscurity
Posted by: admin 16 years, 1 month ago
On a recent trip to Mexico, our casita had a safe in it. The instructions for using it and the combination were printed on a covered sheet of paper sitting on top of the safe. As I scanned for directions on how to change the combination, I read:
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)