Jump to content

Security Watch Revisiting the 10 Immutable Laws of Security


YoKenny

Recommended Posts

Security Watch Revisiting the 10 Immutable Laws of Security, Part 2

Jesper M. Johansson

 

Contents

Law #4: If you allow a bad guy to upload programs to your Web site, it?s not your Web site anymore.

Law #5: Weak passwords trump strong security.

Law #6: A computer is only as secure as the administrator is trustworthy.

Law #7: Encrypted data is only as secure as the decryption key.

 

Conclusion

 

In last month's issue of TechNet Magazine, I kicked off a three-part series revisiting the well-known essay "10 Immutable Laws of Security." My objective is to evaluate them, eight years after they were first postulated, and see whether or not they still hold?in other words, to see if they really are "immutable." (You can find the first part of this series at http://technet.microsoft.com/en-ca/library/cc722487.aspx

I found that the first three laws hold up pretty well. Now I'm ready to scrutinize four more of the laws. In next month's final installment, I will discuss the final three laws, as well as offer some new insight that benefits from eight years of hindsight.

http://technet.microsoft.com/en-us/magazine/cc983778.aspx

"Education is what remains after one has forgotten everything he learned in school." - Albert Einstein

IE7Pro user

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.