The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques
نویسندگان
چکیده
It has long been known that security is easiest to achieve when it is designed in from the start. Unfortunately, it has also become evident that systems built with security as a priority are rarely selected for wide spread deployment, because most consumers choose features, convenience, and performance over security. Thus security officers are often denied the option of choosing a truly secure solution, and instead must choose among a variety of post hoc security adaptations. We classify security enhancing methods, and compare and contrast these methods in terms of their effectiveness vs. cost of deployment. Our analysis provides practitioners with a guide for when to develop and deploy various kinds of post hoc security adaptations.
منابع مشابه
The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques1
It has long been known that security is easiest to achieve when it is designed in from the start. Unfortunately, it has also become evident that systems built with security as a priority are rarely selected for wide spread deployment, because most consumers choose features, convenience, and performance over security. Thus security officers are often denied the option of choosing a truly secure ...
متن کاملA Goal-Oriented Approach to Software Obfuscation
Various software obfuscation techniques have been proposed. However, there are few discussions on proper use of these obfuscations against imaginable threats. An ad-hoc use of obfuscations cannot guarantee that a program is sufficiently protected. For a systematic use of obfuscations and the verification of the result, this paper proposes a goal oriented approach to obfuscation. Specifically, w...
متن کاملFast DES Implementations for FPGAs and itsApplication to a Universal Key - Search Machine ?
Most modern security protocols and security applications are deened to be algorithm independent, that is, they allow a choice from a set of cryptographic algorithms for the same function. Therefore a key-search machine which is also deened to be algorithm independent might be interesting. We researched the feasibility of a universal key-search machine using the Data Encryption Standard (DES) as...
متن کاملP99: Transactional Analysis Group Therapy Techniques in Patients with Post-Traumatic Stress Disorder
Transactional analysis (TA) is a theory of personality that can be applied in virtually all fields of psychology: educational, counseling, organizational and psychotherapy. The atmosphere that supports transactional analysis is one of comfort, security and respect. A positive relationship is forged between the clinician and the client in order to provide a model for subsequent relationships tha...
متن کاملFast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine
Most modern security protocols and security applications are deened to be algorithm independent, that is, they allow a choice from a set of cryptographic algorithms for the same function. Therefore a key-search machine which is also deened to be algorithm independent might be interesting. We researched the feasibility of a universal key-search machine using the Data Encryption Standard (DES) as...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000