YoKenny Posted October 16, 2008 Share Posted October 16, 2008 Security Watch Revisiting the 10 Immutable Laws of Security, Part 2 Jesper M. Johansson Contents Law #4: If you allow a bad guy to upload programs to your Web site, it?s not your Web site anymore. Law #5: Weak passwords trump strong security. Law #6: A computer is only as secure as the administrator is trustworthy. Law #7: Encrypted data is only as secure as the decryption key. Conclusion In last month's issue of TechNet Magazine, I kicked off a three-part series revisiting the well-known essay "10 Immutable Laws of Security." My objective is to evaluate them, eight years after they were first postulated, and see whether or not they still hold?in other words, to see if they really are "immutable." (You can find the first part of this series at http://technet.microsoft.com/en-ca/library/cc722487.aspx I found that the first three laws hold up pretty well. Now I'm ready to scrutinize four more of the laws. In next month's final installment, I will discuss the final three laws, as well as offer some new insight that benefits from eight years of hindsight. http://technet.microsoft.com/en-us/magazine/cc983778.aspx "Education is what remains after one has forgotten everything he learned in school." - Albert Einstein IE7Pro user Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now