LinuxSecurity.com: Approaches to choosing the strength of your security measuresJan 29, 2002, 14:08 (1 Talkback[s])
(Other stories by Anton Chuvakin)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
[ Thanks to LinuxSecurity Contributor for this link. ]
Ideally, security should be user-independent (security of the system should not depend upon the decision of an end-user), user-transparent (does not prevent or hinder any authorized action of the user), effective! (stop all unauthorized actions of a legitimate user and all actions of an intruder) and cost-effective (not cost more than the protected assets). Security measures should also be flexible to reflect a fast-paced and somewhat chaotic environment of the modern infosec threat landscape.
0 Talkback[s] (click to add your comment)