VME te Evere, Oud-Strijderslaan 101, 103, 105, 107, 109 en 111 (KBO 0884.081.457)

VME te Evere, Oud-Strijderslaan 101, 103, 105, 107, 109 en 111 (KBO 0884.081.457)
Blog van een mede-eigenaar, niet-mandataris van de VME

Zoeken in deze blog

27 oktober 2011

10 Immutable Laws of Security

In 2000 werd op de website van Microsoft TechNet een artikel gepubliceerd over veiligheid van computersystemen, dat in feite ook toepasbaar is op alle systemen en installaties waar mensen actief tussenkomen om de kwaliteit en integriteit ervan te garanderen.

Bron: http://technet.microsoft.com/en-us/library/cc722487.aspx (Engelstalig)

Hierna volgt ter overweging een uittreksel, namelijk de “10de wet”, maar lees ook de rest. De principes ervan zijn perfect overzetbaar op de context van onze mede-eigendom.







Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses the hardware to open new vistas for computer users, as well as advancements in cryptography and other sciences. It's tempting to believe that technology can deliver a risk-free world, if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn't exist, and in fact isn't likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That's just a fact of life. But even if software could be made perfect, it wouldn't solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature—this is usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys will respond by shifting their focus away from the technology and toward the human being at the console. It's vital that you understand your role in maintaining solid security, or you could become the chink in your own systems' armor.
The solution is to recognize two essential points.
  • First, security consists of both technology and policy—that is, it's the combination of the technology and how it's used that ultimately determines how secure your systems are.
  • Second, security is journey, not a destination—it isn't a problem that can be "solved" once and for all; it's a constant series of moves and countermoves between the good guys and the bad guys.
The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Microsoft Security website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we're developing more all the time. Combine great technology with sound judgment, and you'll have rock-solid security.