Enterprise Information Systems Security Architectural Framework[EISSAF]
Some may wonder why there's been such a long lull in activities on this site. School is back in Session, as is so many other volunteer activities I am engaged in, as well as my day job of course.
But that's not the main reason for the lull though. I have spent the better part of the last three weeks reviewing the concept of security metrics. I have found several interesting ideas from the most unexpected places, at least in my opinion, and I am closer to a framework today than I was several months ago.
Ok, some of you will ask why I'm being so cryptic. Well remember this is also my doctoral research whose results will culminate in a dissertation. Also, many journal publishers prefer to be the first to publish a work and some of the contents I have either been submitted or will at some point be submitted for publication. The stuff I present here are stuff, I believe (in my naivete) to be 'safe' , without jeopardizing my work.
Ok, I am, however happy to discuss and even share my ideas and research with you, but will prefer to know who I'm telling(si ?) .
I am interested in speaking or teaching opportunities where general security topics are the focus of discussion. I will also be happy to take on challenges in enterprise information system security architecture as an 'adjunct consultant'. (Ok I coined the phrase).
Feel free to contact me for any reason at all, except of course if you're trying to sell me some porn or stuffs like that.
Ok. I'm still alive and kicking, as well as working. I'm on a tight time budget though.
Some may wonder why there's been such a long lull in activities on this site. School is back in Session, as is so many other volunteer activities I am engaged in, as well as my day job of course.
But that's not the main reason for the lull though. I have spent the better part of the last three weeks reviewing the concept of security metrics. I have found several interesting ideas from the most unexpected places, at least in my opinion, and I am closer to a framework today than I was several months ago.
Ok, some of you will ask why I'm being so cryptic. Well remember this is also my doctoral research whose results will culminate in a dissertation. Also, many journal publishers prefer to be the first to publish a work and some of the contents I have either been submitted or will at some point be submitted for publication. The stuff I present here are stuff, I believe (in my naivete) to be 'safe' , without jeopardizing my work.
Ok, I am, however happy to discuss and even share my ideas and research with you, but will prefer to know who I'm telling(si ?) .
I am interested in speaking or teaching opportunities where general security topics are the focus of discussion. I will also be happy to take on challenges in enterprise information system security architecture as an 'adjunct consultant'. (Ok I coined the phrase).
Feel free to contact me for any reason at all, except of course if you're trying to sell me some porn or stuffs like that.
Ok. I'm still alive and kicking, as well as working. I'm on a tight time budget though.

