The Artima Developer Community
Sponsored Link

.NET Buzz Forum
SECSYM: Security Symposium II

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Tim Sneath

Posts: 395
Nickname: timsneath
Registered: Aug, 2003

Tim Sneath is a .NET developer for Microsoft in the UK.
SECSYM: Security Symposium II Posted: Oct 30, 2003 7:41 PM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by Tim Sneath.
Original Post: SECSYM: Security Symposium II
Feed Title: Tim Sneath's Blog
Feed URL: /msdnerror.htm?aspxerrorpath=/tims/Rss.aspx
Feed Description: Random mumblings on Microsoft, .NET, and other topics.
Latest .NET Buzz Posts
Latest .NET Buzz Posts by Tim Sneath
Latest Posts From Tim Sneath's Blog

Advertisement

The moment you plug a live Internet network connection into your computer, you become part of the seediest neighbourhood in the planet. Your neighbours include thieves, con-artists, vandals, criminals and hackers. No wonder our computers are exposed to a very different environment to that of ten years ago!

It only takes one bad guy to take your system down. This is the attacker's advantage and the defender's dilemma:

  • The Defender must defend all points; the Attacker will choose the weakest point.
  • The Defender must be constantly vigilant; the Attacker will strike at will.
  • The Defender can only defend against what he/she knows about; the Attacker will study for vulnerable points.

Worse, there are many conflicts when building software. Choosing security often means a trade-off in other areas. Historically in the industry, software has always been very convenient: easy to use, with services switched on by default and rapid releases. The security pendulum has to a certain extent swung to the other side: reducing the attack surface has made products harder to use - we get more IIS questions now asking "how do I just get stuff done" because many things are switched off. The pendulum is now starting to swing to a more balanced perspective where the attack surface is smaller and security and first-class privacy are first-class features, without turning so much off that the product becomes unusable.

You can't build, design and test code and then check for security - you need a process that fosters secure systems. Internal Microsoft statistics show that this adds perhaps 15% to the schedule, but the net effect of not designing security is a 30% schedule slip.

Read: SECSYM: Security Symposium II

Topic: Avalon - CLI307: Automated UI Testing Previous Topic   Next Topic Topic: Indigo- A good citizen among the current platform technologies

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use