Information Security


Information Security is a discipline to protect information and information systems from threats through security controls to:

  1. achieve the objectives of confidentiality, integrity, and availability, or CIA for short,
  2. support the organizational mission and processes, and
  3. create and deliver values.

The definition of Information Security is revised as Information Security is a business issue and should be aligned with the business mission, goals, and strategies, enable and streamline business processes, and create and deliver values ultimately.

Case Study – AmyPro Consultant


  • AmyPro Consultant is headquartered in Taipei with a branch in New York, US.
  • An offshore software partner in Bengaluru, India develops and maintains the proprietary CRM system.
  • Staff is working on-site in Taipei, on the road, and from home.
  • How do you implement and support the secure network?

Intonation Patterns

  • Different Patterns of Intonation
    • Rising: sentence not finished
    • Failing: end of a sentence
    • Rising-falling
    • Falling-rising
    • Flat
    • High
    • Low
  • New Information vs. Old Information
    • Rising: old information
    • Failing: new information
  • Intonation in Questions
    • Rising: you think you know the answer
    • Failing: you already have some idea of the answer but don’t know it. You just ask to check or confirm that your idea is right.
  • More Ways to Use Intonation in Questions
    • Rising: criticizing someone
    • Falling: make a comment
    • Rising(indirect,hesitant)/Falling(direct,confident): make a suggestion
    • Surprise, Doubt, Excitement, Sarcasm, and Annoyance
  • Practice Sentences
    • Do you need some help?

Identity and Access Management


  • Identity
    • An identity is the unique identifier of an entity.
    • An entity is anything that exists or comes into being.
  • Identification
    • Identification is the process for a subject to confess or present its identity to the authentication server.
  • Authentication
    • Authentication is the process for the authentication server to verify if the identity presented by the subject is authentic against the directory or account repository.
    • An access token is returned if the authentication succeeds.
  • Authorization
    • Authorization is the process for the service or resource provider to determine if the access request can be granted to the subject based on the access token presented and the access control matrix.
  • Accounting
    • Accounting is the process for the service or resource provider to generate records or logs against the subject’s activities so that the accountability can be enforced.
  • Session
    • A session is a two-way communication during a period of time with specific start and closure time.
    • It’s common for applications to track user activities during the session from logging in to logging out.
  • Get Started Your CISSP Journey!

CISSP = The Onion + The Peacock


  • CISSP is an ISC2 certified security professional of information systems.
  • The Onion and The Peacock as metaphors are the foundational concepts for CISSP aspirants to prepare for the CISSP exam.
    • The Onion is a metaphor as a concept model to protect assets (information systems) from threats through security controls to achieve the objectives of confidentiality, integrity, and availability (CIA), support the organizational mission and processes and deliver business values. (The triangle stands for the organization.)
    • The Peacock is a metaphor as a concept model to demonstrate the information system components, the target we are protecting.
  • The Amicliens InfoSec Conceptual Model is developed by Wentz Wu, co-founder of Amicliens, based on The Onion and The Peacock that integrates the CISSP and CISM knowledge areas seamlessly.
  • To start your CISSP journey, please visit the CISSP page.
  • To know more about the author, Wentz Wu, please visit the About Me page.