Nonsecurity Considerations in Security Decisions

نویسنده

  • Bruce Schneier
چکیده

• You can have as much security as you want – What are you willing to give up to get it? • Security always involves trade-offs – If no airplanes flew, 9/11 couldn't have happened – Gated communities offer more security but less privacy • We make decisions every day about these trade-offs • To do it thoughtfully, we must understand: – How security works – The threats and risks – The costs

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

حدود صلاحیت دیوان عدالت اداری در انتصاب مدیران مؤسسات عمومی غیر‌دولتی (مطالعه موردی مدیرعامل سازمان تأمین اجتماعی)

 The Social Security Organization, according to The List of Non-governmental Organizations and Public Institutions Act, is a non-governmental public organization. It currently supports about 33 million workers, retirees and their families. Always there is alignment among the main objectives of social security and economic objectives of the country. All the factors that effect on econom...

متن کامل

Toward Non-security Failures as a Predictor of Security Faults and Failures

In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security realm. We analyzed non-security and security failure data reported for the year 2007 of a Cisco software system. We used non-security failure reports as input variables into a classification and regression tree (CART) mo...

متن کامل

An Empirical Study of Security Requirements in Planning Bug Fixes for an Open Source Software Project

it is often difficult to estimate the resources needed to plan for bug fixing activities in software development projects. Security bug fixes are commonly implemented as patches in response to emergent common vulnerability and exposure (CVE) reports. In this paper we investigate how to plan for bug fixing, and whether security related bug fixes are different from other bugs. In a preprocessing ...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

Replication Based Job Scheduling in Grids with Security Assurance

Security assurance is a critical requirement for QoS or SLA satisfactions in risky grid environments because jobs may be scheduled to multiple machines across different distributed administrative domains. Unlike conventional methods using fixed-number job replications, in this paper, we propose a security-aware parallel and independent job scheduling algorithm based on adaptive job replications...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2007