Information Security

Roles: attacker, defender, perimeter, boundary, access, credential, privilege, zone, trust

The protection of information assets through controlling access, detecting intrusion, and managing trust boundaries. As a frame, information security borrows heavily from military strategy (defense in depth, perimeter, attack surface) and architecture (firewalls, vaults, zones). Its core structural insight is that security is a gradient, not a binary: the question is never whether a system is “secure” but what level of access is granted under what conditions and with what verification. The frame foregrounds the adversarial relationship between those who authorize access and those who seek unauthorized access.

Applied To This Frame (2)