Finding The Hidden InfoSec Story

The Literature Initiative

Literature is one of the means through which culture has been distributed and influenced throughout the course of humanity. It stirs the emotions and educates its audience on the values that underpin society. It’s through the influence literature has, both consciously and unconsciously, on people’s decision-making, that we decided to look at the underlying stories contained within fiction and what we can learn from them.

We’ve focused on classic pieces by The Grimm Brothers, Aesop and Shakespeare to identify the hidden Information Security stories locked within. Through these we’ve explored;

  • Characteristics, features or values of information, knowledge or data called confidentiality, integrity or availability;
  • Role of information security practices and controls throughout these pieces of literature;
  • Analogies between security practices and controls, and the context of the story.

The following analogies have been written by a team of our contributors and we’ll be releasing one every working day for the next few weeks commencing on Monday 29th July. We’d urge you to read, use and share these analogies yourselves.

 

Literature Initiative Analogies

Shakespeare’s Sonnets and Policy Statements

Dave Brooks compares the language used in Shakespeare's Sonnets with that of our Policy Statements and asks it we're really being as clear as we could be.

Rumpelstiltskin – A Lesson in Password Security

How do you crack the seemingly impossible? Paul Farmer takes a look at the Brothers Grimm tale 'Rumpelstiltskin' and what it can teach us about password security.

The North Wind and The Sun

Dave Brooks looks at Aesop's 'The North Wind and The Sun' and looks at whether the wind or the sun present the best technical hack.

Cymbeline

With issues around identity and authenticity Dave Brooks explores what Shakespeare's 'Cymbeline' can tell us about phishing.

The Wolf, the She-Goat and the Kid

Paul Farmer explores the security parallels between Aesop's 'The Wolf, the She-Goat, and the Kid' with those of modern day practices.

The Shoes that were Danced to Pieces

In the tale 'The Shoes that were Danced to Pieces' by the Brothers Grimm, a King seeks to solve the mystery of what's happening to his 12 daughters shoes at night. Dave Brooks looks at the lessons we can learn from their plight.

Lessons from the Big Four – Shakespeare’s Tragic Heroes

Jenny Radcliffe looks at Shakespeare's central characters Hamlet, Macbeth, Othello and King Lear and asks what these tragic heroes can teach us about Information Security.

The Sheep Biter – Insider Threat in Fable

Is the real threat the one from within? Paul Farmer looks at Aesop's fable 'The Sheep Biter' for answers.

The Power of Three

Dave Brooks looks at the works of the Brothers Grimm and how significant the role of three is to both their stories and also the wider security context.

Wolf in Sheep’s Clothing

Jenny Radcliffe draws out the security parallels from Aeosp's fable 'The Wolf in Sheep's Clothing' and looks at whether we can really spot the wolves within our own organisations.

Malvolio the Incorruptible

Analysing the character of the supposedly incorruptible Malvolio in Shakespeare's 'Twelfth Night' Ron Condon explores how vulnerable we can be to social engineering

The Crow and the Pitcher

Dave Brooks takes a look at the classic Aesop fable 'The Crow and the Pitcher' and what this can teach us about hacking.

Rapunzel

What can Rapunzel tell us about human behaviour and the effect of social engineering? Jenny Radcliffe looks at the Brothers Grimm classic story and how a complex security system was breached.