<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is Trust? in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42235#M248</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Onward we go to under stand the word "Trust"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="crumb gtm_crumb"&gt;Trust Modeling for Security Architecture Development&amp;nbsp; by Sun Microsystems 2003&lt;/P&gt;&lt;DIV class="ten columns alpha rFull"&gt;&lt;DIV class="clearfix"&gt;&lt;DIV&gt;&lt;DIV&gt;Information technology architects must build applications, systems, and networks that match ordinary users' expectations of trust in terms of identity, authentication, service level agreements, and privacy. This article describes the vocabulary of trust relationships and demonstrates the practical importance of using trust modeling to formalize the threshold for risk.&lt;/DIV&gt;&lt;DIV class="relatedBook slide"&gt;&lt;DIV class="productArea graydient clearfix"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="productArea graydient clearfix"&gt;&lt;A href="https://www.informit.com/store/enterprise-security-solaris-operating-environment-security-9780131000926?w_ptgrevartcl=Trust+Modeling+for+Security+Architecture+Development+_31546" target="_blank" rel="noopener"&gt;Enterprise Security: Solaris Operating Environment, Security Journal, Solaris OEv2.51, 2.6, 7, and 8&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;Understanding Trust&lt;P&gt;As with many seemingly complex concepts, a good starting point is to consider the commonplace, everyday meaning of a word. Trust is an important part of our lives and it has numerous definitions. Consider questions like the following, which we deal with regularly even if we don't formalize a model:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;What does it take to establish trust?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;How do I determine the degree of trust to assign to an individual or process?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Would I trust a recommendation from an auto mechanic or a child care provider the same way?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;Defining Trust&lt;P&gt;According to the ITU-T X.509, Section 3.3.54, trust is defined as follows:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;"Generally an entity can be said to 'trust' a second entity when the first entity makes the assumption that the second entity will behave exactly as the first entity expects."&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;For the sake of defining trust and trust modeling relative to security architecture methodology, the following set of principles or elements are offered:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Trust is a characteristic and quality of a security architecture.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Trust is a balancing of liability and due diligence. For example, you must decide how much effort to expend to reduce liability to an acceptable level for a particular business proposition and stated security policy. You must establish an equilibrium of trust.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Trust is the enabling of confidence that something will or will not occur in a predictable or promised manner.&amp;nbsp; The enabling of confidence that something will or will not occur in a predictable or promised manner.&amp;nbsp; The enabling of confidence is supported by identification, authentication, accountability, authorisation and availability.&lt;/LI&gt;&lt;LI&gt;Trust is the binding of of unique attributes to a unique identity, for example, accountability.&amp;nbsp; This is both a qualitative and a subjective measure of expectations regarding another's behaviour and relative to a defined security policy.&amp;nbsp; Essentially a trust relationship is established when a satisfactory level of confidence in the attributes provided by an entity is achieved.&lt;/LI&gt;&lt;LI&gt;Trust is defined as a binary relationship, or set of componed binary relationship, based individual identity or unique characteristic validation.&amp;nbsp; That is, trust is the establishment of a trust relationship through a validation process and the subsequent use of that relationship in some transactional context.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Do not focus solely on technical solutions. As with all aspects of a security architecture, a successful trust model must consider people, process, and technology.&lt;/P&gt;&lt;P&gt;Finally, if you remember nothing else from this article, do not forget the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Failure to understand what trust model (if any) is actually in effect can create a false sense of security that may lead to serious, even catastrophic, financial and legal problems.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Adversaries exploit weak trust models.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Source:&amp;nbsp; &lt;A href="https://www.informit.com/articles/article.aspx?p=31546&amp;amp;seqNum=6" target="_blank" rel="noopener"&gt;https://www.informit.com/articles/article.aspx?p=31546&amp;amp;seqNum=6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Wed, 06 Jan 2021 21:20:41 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2021-01-06T21:20:41Z</dc:date>
    <item>
      <title>What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42140#M237</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been thinking about this subject for some time, and I cannot get a definitive statement which rings true, so far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is part 1 of my thinking:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Part 1: I think we need to examine the word "Trust" carefully - from a human being context:&lt;BR /&gt;Trust is a central part of all human relationships, including romantic partnerships, family life, business operations, politics, and medical practices. If you don't trust your doctor or psychotherapist, for example, it is much harder to benefit from their professional advice.&lt;BR /&gt;But what is trust? Here are some possibilities:&lt;BR /&gt;Trust is a set of behaviors, such as acting in ways that depend on another.&lt;BR /&gt;Trust is a belief in a probability that a person will behave in certain ways.&lt;BR /&gt;Trust is an abstract mental attitude toward a proposition that someone is dependable.&lt;BR /&gt;Trust is a feeling of confidence and security that a partner cares.&lt;BR /&gt;Trust is a complex neural process that binds diverse representations into a semantic pointer that includes emotions.&lt;BR /&gt;The importance of trust is becoming more dependent on complex, often invisible, connected technologies, data streams and third parties. But people instinctively distrust things they can't see, touch or understand.&lt;BR /&gt;&lt;BR /&gt;And yet, we are talking fundamentally about technical trust of machines, devices, networks, applications, users and data&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;I will publish Part 2 shortly, but think of the context of Zero Trust and Trust Access in connection with Zero Trust Network Architecture and Zero Trust Architect.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;I am sure there is spades of comments and many thoughts from many others, which are worth sharing and debating?&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Caute_cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:44:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42140#M237</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42142#M238</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been thinking about this subject for some time, and I cannot get a definitive statement which rings true, so far.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is part 1 of my thinking:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Part 1: I think we need to examine the word "Trust" carefully - from a human being context:&lt;BR /&gt;Trust is a central part of all human relationships, including romantic partnerships, family life, business operations, politics, and medical practices. If you don't trust your doctor or psychotherapist, for example, it is much harder to benefit from their professional advice.&lt;BR /&gt;But what is trust? Here are some possibilities:&lt;BR /&gt;Trust is a set of behaviors, such as acting in ways that depend on another.&lt;BR /&gt;Trust is a belief in a probability that a person will behave in certain ways.&lt;BR /&gt;Trust is an abstract mental attitude toward a proposition that someone is dependable.&lt;BR /&gt;Trust is a feeling of confidence and security that a partner cares.&lt;BR /&gt;Trust is a complex neural process that binds diverse representations into a semantic pointer that includes emotions.&lt;BR /&gt;The importance of trust is becoming more dependent on complex, often invisible, connected technologies, data streams and third parties. But people instinctively distrust things they can't see, touch or understand.&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;A href="https://www.imessageapp.org/imessage-for-pc/" target="_blank" rel="noopener"&gt;&lt;FONT color="#FFFFFF"&gt;Download iMessage for PC&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;And yet, we are talking fundamentally about technical trust of machines, devices, networks, applications, users and data&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;I will publish Part 2 shortly, but think of the context of Zero Trust and Trust Access in connection with Zero Trust Network Architecture and Zero Trust Architect.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;I am sure there is spades of comments and many thoughts from many others, which are worth sharing and debating?&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Caute_cautim&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you&amp;nbsp;trust&amp;nbsp;someone, you believe that they are honest and sincere and will not deliberately&amp;nbsp;do&amp;nbsp;anything to harm you.&amp;nbsp; Your&amp;nbsp;trust&amp;nbsp;in someone is your belief that they are honest and sincere and will not deliberately&amp;nbsp;do&amp;nbsp;anything to harm you. He destroyed me and my&amp;nbsp;trust&amp;nbsp;in men. You've betrayed their&amp;nbsp;trust.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 10:42:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42142#M238</guid>
      <dc:creator>Bowmann</dc:creator>
      <dc:date>2021-01-06T10:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42154#M239</link>
      <description>&lt;P&gt;I like the APA's definition on Trust:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;trust&lt;BR /&gt;1. n. reliance on or confidence in the dependability of someone or something. In interpersonal relationships, trust refers to the confidence that a person or group of people has in the reliability of another person or group; specifically, it is the degree to which each party feels that they can depend on the other party to do what they say they will do. The key factor is not the intrinsic honesty of the other people but their predictability. Trust is considered by most psychologists to be a primary component in mature relationships with others, whether intimate, social, or therapeutic. &lt;A href="https://dictionary.apa.org/trust" target="_blank" rel="noopener"&gt;American Psychological Association&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I look forward to reading part 2!&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:13:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42154#M239</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-01-05T15:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42157#M240</link>
      <description>In my first book I had a whole chapter just on trust. The copy editor sent me a&lt;BR /&gt;special message noting how important it was. (Copy editors *NEVER* comment&lt;BR /&gt;on the content of your manuscript ...)&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Tue, 05 Jan 2021 15:53:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42157#M240</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-01-05T15:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42170#M241</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;&amp;nbsp; I would be interested in whether your book is still in print, available via Amazon or in Kindle format?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trust is an important subject - it is becoming far more important because the ordinary person cannot understand what is meant by "digital trust" or even Zero Trust.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part 2 states:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For zero trust:&amp;nbsp; For zero trust to be effective, it needs to consider not only the user, but the risks of the resources themselves. &lt;STRONG&gt;It does not.&lt;/STRONG&gt; You would never grant access in a zero trust model if the assets have remotely exploitable critical flaws. Zero trust ignores the resources risk, while focusing inordinately on access controls.&amp;nbsp; Hence we should not use the term "Trust Access", especially if the resources risk has been ignored or the assets have already been compromised aka Fireeye/Solarwinds lessons.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So fundamentally, if any component within the system is not secure, or cannot be implicitly trusted or is suspected to have been compromised, they Zero Trust cannot be achieved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also Zero Trust requires a policy engine, which constantly monitors and ensures that agreed, approved policies are centrally applied.&amp;nbsp; So far this is not achievable, unless we engage the assistance of AI and ML to ensure objective compliance and enforcement for all components.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So very interested, what or how you interpret "Digital Trust" in terms of digital identity, which is a core subject in a Trusted Digital Identity system or even within Zero Trust, some interpret it as Trust Access, which implies everything is centred on Trust.&amp;nbsp;&amp;nbsp; Can Trust be applied via electronic, digital systems - because we put an awful lot of emphasis on it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would appreciate your thoughts and wisdom, and other thoughts too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 22:13:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42170#M241</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-05T22:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42171#M242</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part 2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part 2 states:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For zero trust:&amp;nbsp; For zero trust to be effective, it needs to consider not only the user, but the risks of the resources themselves. &lt;STRONG&gt;It does not.&lt;/STRONG&gt; You would never grant access in a zero trust model if the assets have remotely exploitable critical flaws. Zero trust ignores the resources risk, while focusing inordinately on access controls.&amp;nbsp; Hence we should not use the term "Trust Access", especially if the resources risk has been ignored or the assets have already been compromised aka Fireeye/Solarwinds lessons.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So fundamentally, if any component within the system is not secure, or cannot be implicitly trusted or is suspected to have been compromised, they Zero Trust cannot be achieved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also Zero Trust requires a policy engine, which constantly monitors and ensures that agreed, approved policies are centrally applied.&amp;nbsp; So far this is not achievable, unless we engage the assistance of AI and ML to ensure objective compliance and enforcement for all components.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 22:14:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42171#M242</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-05T22:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42188#M243</link>
      <description>&lt;P&gt;No one else has mentioned this yet, so I will...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bruce Schneier published a book on the topic of trust in 2012:&amp;nbsp;&lt;A href="https://www.schneier.com/books/liars-and-outliers" target="_blank"&gt;https://www.schneier.com/books/liars-and-outliers&lt;/A&gt;. I haven't read it yet, but I've read some of the essays and articles he's published over the years that touch on topics from the book.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 14:05:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42188#M243</guid>
      <dc:creator>jmikesmith</dc:creator>
      <dc:date>2021-01-06T14:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42219#M244</link>
      <description>&amp;gt; Caute_cautim (Community Champion) mentioned you in a post! Join the conversation&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;&amp;nbsp; I would be interested in whether your book is still in print,&lt;BR /&gt;&amp;gt; available via Amazon or in Kindle format?&lt;BR /&gt;&lt;BR /&gt;I've just checked at&lt;BR /&gt;&lt;A href="https://www.amazon.com/Robert-Slade/e/B001H6MUCW" target="_blank"&gt;https://www.amazon.com/Robert-Slade/e/B001H6MUCW&lt;/A&gt;&lt;BR /&gt;and all of them (except "Viruses Revealed" and the dictionary) seem to be&lt;BR /&gt;available. (I guess since the copyrights have reverted to me on those, they aren't&lt;BR /&gt;still selling them.)&lt;BR /&gt;&lt;BR /&gt;But then again, the dictionary does seem to be available as well ...&lt;BR /&gt;&lt;A href="https://www.amazon.com/Dictionary-Information-Security-Robert-Slade-" target="_blank"&gt;https://www.amazon.com/Dictionary-Information-Security-Robert-Slade-&lt;/A&gt;&lt;BR /&gt;ebook/dp/B001077CJ4&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Wed, 06 Jan 2021 19:09:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42219#M244</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-01-06T19:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42231#M245</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a Research-gate paper on Trust - they conclude:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;In sum, trust is a behavioral construct; to trust is to place one’s confidence in the other party to the &lt;/SPAN&gt;&lt;SPAN&gt;relationship. Trust is preceded by perceived trustworthiness of the party, the expectation of trustor of the trustee’s &lt;/SPAN&gt;&lt;SPAN&gt;behavior,&lt;/SPAN&gt;&lt;SPAN&gt;and/or emotional bonds between the trustee and the trustor. Both cognitive and affective anticipations &lt;/SPAN&gt;&lt;SPAN&gt;lead to a choice of placing or not placing one’s confidence in the other party. Such a decision or choice may lead to &lt;/SPAN&gt;&lt;SPAN&gt;both instrumental and psychologic&lt;/SPAN&gt;&lt;SPAN&gt;al outcomes as consequences of trust, including highly social and emotional &lt;/SPAN&gt;&lt;SPAN&gt;outcomes. Trust conceived as such, incorporates all the essential components we can conceive; we expect that our &lt;/SPAN&gt;&lt;SPAN&gt;effort will serve as a stepping stone for other researchers in thei&lt;/SPAN&gt;&lt;SPAN&gt;r endeavors of exploring the nature of trust."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It is obvious, we simply do not have an agreed term for Trust in a digital context or even electronics, so if we cannot trust a system, how can we in fact have "trust" as in Zero Trust.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We need to examine this more closely, and ensure that there is an absolute agreement as to what is Trust in the context of digital Identity, Digital electronics, or that of Systems?&amp;nbsp; Can we actually have a trustworthy system?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Caute_cautim&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 20:16:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42231#M245</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-06T20:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42232#M246</link>
      <description>&lt;P&gt;HI &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/446927159"&gt;@jmikesmith&lt;/a&gt;&amp;nbsp;&amp;nbsp; You are of course correct:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.schneier.com/essays/archives/2019/02/theres_no_good_reaso.html" target="_blank"&gt;https://www.schneier.com/essays/archives/2019/02/theres_no_good_reaso.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But given that Bruce Schneier cannot himself put a good definition of trust for security systems or even Blockchain, then what chance do we have of explaining to a CEO whether a security system can be implicitly trusted given the recent circumstances, which undermined the supply chain i.e. Solarwinds, which now has a legal case raised against them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Trust is very important in our day to day interactions, but if we cannot define it explicitly, do we mere mortal accept everything everyone states is actually trustworthy i.e. this is system can be trusted, but if one component is compromised, then potentially the whole system is render untrustworthy and has to be burnt down and re-built from scratch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regars&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 20:25:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42232#M246</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-06T20:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42233#M247</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;Do we get signed autograph copies of your books?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what exactly does your dictionary state and define "Trust"?&amp;nbsp; Or even Zero Trust?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 20:36:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42233#M247</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-06T20:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42235#M248</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Onward we go to under stand the word "Trust"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="crumb gtm_crumb"&gt;Trust Modeling for Security Architecture Development&amp;nbsp; by Sun Microsystems 2003&lt;/P&gt;&lt;DIV class="ten columns alpha rFull"&gt;&lt;DIV class="clearfix"&gt;&lt;DIV&gt;&lt;DIV&gt;Information technology architects must build applications, systems, and networks that match ordinary users' expectations of trust in terms of identity, authentication, service level agreements, and privacy. This article describes the vocabulary of trust relationships and demonstrates the practical importance of using trust modeling to formalize the threshold for risk.&lt;/DIV&gt;&lt;DIV class="relatedBook slide"&gt;&lt;DIV class="productArea graydient clearfix"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="productArea graydient clearfix"&gt;&lt;A href="https://www.informit.com/store/enterprise-security-solaris-operating-environment-security-9780131000926?w_ptgrevartcl=Trust+Modeling+for+Security+Architecture+Development+_31546" target="_blank" rel="noopener"&gt;Enterprise Security: Solaris Operating Environment, Security Journal, Solaris OEv2.51, 2.6, 7, and 8&lt;/A&gt;&lt;/DIV&gt;&lt;/DIV&gt;Understanding Trust&lt;P&gt;As with many seemingly complex concepts, a good starting point is to consider the commonplace, everyday meaning of a word. Trust is an important part of our lives and it has numerous definitions. Consider questions like the following, which we deal with regularly even if we don't formalize a model:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;What does it take to establish trust?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;How do I determine the degree of trust to assign to an individual or process?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Would I trust a recommendation from an auto mechanic or a child care provider the same way?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;Defining Trust&lt;P&gt;According to the ITU-T X.509, Section 3.3.54, trust is defined as follows:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;"Generally an entity can be said to 'trust' a second entity when the first entity makes the assumption that the second entity will behave exactly as the first entity expects."&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;For the sake of defining trust and trust modeling relative to security architecture methodology, the following set of principles or elements are offered:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Trust is a characteristic and quality of a security architecture.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Trust is a balancing of liability and due diligence. For example, you must decide how much effort to expend to reduce liability to an acceptable level for a particular business proposition and stated security policy. You must establish an equilibrium of trust.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Trust is the enabling of confidence that something will or will not occur in a predictable or promised manner.&amp;nbsp; The enabling of confidence that something will or will not occur in a predictable or promised manner.&amp;nbsp; The enabling of confidence is supported by identification, authentication, accountability, authorisation and availability.&lt;/LI&gt;&lt;LI&gt;Trust is the binding of of unique attributes to a unique identity, for example, accountability.&amp;nbsp; This is both a qualitative and a subjective measure of expectations regarding another's behaviour and relative to a defined security policy.&amp;nbsp; Essentially a trust relationship is established when a satisfactory level of confidence in the attributes provided by an entity is achieved.&lt;/LI&gt;&lt;LI&gt;Trust is defined as a binary relationship, or set of componed binary relationship, based individual identity or unique characteristic validation.&amp;nbsp; That is, trust is the establishment of a trust relationship through a validation process and the subsequent use of that relationship in some transactional context.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Do not focus solely on technical solutions. As with all aspects of a security architecture, a successful trust model must consider people, process, and technology.&lt;/P&gt;&lt;P&gt;Finally, if you remember nothing else from this article, do not forget the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Failure to understand what trust model (if any) is actually in effect can create a false sense of security that may lead to serious, even catastrophic, financial and legal problems.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Adversaries exploit weak trust models.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Source:&amp;nbsp; &lt;A href="https://www.informit.com/articles/article.aspx?p=31546&amp;amp;seqNum=6" target="_blank" rel="noopener"&gt;https://www.informit.com/articles/article.aspx?p=31546&amp;amp;seqNum=6&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 06 Jan 2021 21:20:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42235#M248</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-01-06T21:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42240#M249</link>
      <description>&amp;gt; Caute_cautim (Community Champion) mentioned you in a post! Join the conversation&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; &amp;nbsp; So what exactly&lt;BR /&gt;&amp;gt; does your dictionary state and define "Trust"?&lt;BR /&gt;&lt;BR /&gt;trust&lt;BR /&gt;extent to which one can have confidence that the system meets its objectives,&lt;BR /&gt;that is, that the system does what it claims to do and does not perform unwanted&lt;BR /&gt;functions. This is in line with Gene Spafford's famous definition that a secure&lt;BR /&gt;computer is one that does what it is supposed to.&lt;BR /&gt;&lt;BR /&gt;There are nine more related definitions.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;If you can't make a mistake, you can't make anything.- Marva Collins&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Wed, 06 Jan 2021 22:36:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/42240#M249</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-01-06T22:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/43253#M284</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;&amp;nbsp; So if any part of your system is compromised, trust would be lost.&amp;nbsp; If you review Systemic systems, all components are trusted until the point in time, that one or more components cause a failure or compromise to occur.&amp;nbsp;&amp;nbsp; Nothing is static, and constant review and updates are required at all times.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2021 21:06:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/43253#M284</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-02-14T21:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: What is Trust?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/43294#M287</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;However, witness the recent security breaches with Fireeye/Solarwinds and Accellion both of which were supply chain issues - so although the organisation may have had all its components tested and verified as a system.&amp;nbsp; One external component or relationship failed, thus is it became a systemic failure.&amp;nbsp;&amp;nbsp; So if trust is based on all the components being aligned, verified and one fails, then you have a loss of trust as well as a systemic failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2021 19:45:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/What-is-Trust/m-p/43294#M287</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-02-15T19:45:02Z</dc:date>
    </item>
  </channel>
</rss>

