social engineering attacks and
industrial espionage to name a few. This evolving repertoire of
threats is being complemented by varying perspectives and
requirements to information security. Laws and regulations
need to be upheld as well as business requirements met, while
operational aspects of information security are not lost out of
sight. Whilst operational aspects are often assigned to
specialists (in fields like network security or software security),