Created
May 30, 2012 02:23
-
-
Save funsim/2832962 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<introduction> | |
Security is all about attaining an appropriate level of security in an infinite | |
sea of vulnerability. Every computer system and network is compromizable | |
given enough time, resources, and motivation, however such resources are | |
never unlimited, so security becomes about finding the right balance. What | |
you are reaching for is to raise the bar of your defensive measures at least | |
high enough that it is not worthwhile for your adversaries to commit the | |
resources required to breach your security. Therefore this report is about two | |
things. Firstly determining the optimal place for you to raise your security | |
capability to such that you put your online activities effectively out of reach | |
of your adversaries. Secondly this report is about determining and letting you | |
know where your current security level is in relation to your optimal level, | |
and to show you what your best next actions are to move from your current | |
position to your optimal position. | |
This report is broken down into four major sections. Your ‘Threat rating’, which | |
is an overall indicator of how far your current security position is from your | |
optimal position. Your ‘Anonymity gap’, which looks at whether it is important | |
for you to keep your identity secret from your adversaries, and examines if the | |
measures you are taking are appropriate given your need. The next section is | |
your ‘Security gap’, which is the largest section and gives you specific advice | |
on where and how you need to improve your defensive security capability. Lastly | |
there is your ‘Perception gap’, which looks at your perception of how secure | |
you are compared to the reality of your security position. | |
Please read our disclaimer before proceeding with taking action based on | |
advice contained herein. | |
</introduction> | |
<advisaries> | |
This section is an indication of who the likely individuals or organizations are | |
that may have the motivation and skills to pose a threat to you online. Who your | |
adversaries are determines many factors such as where your optimal security | |
levels should be. It is also good for you to have an understanding of the adversaries | |
that apply to your situation, so you can better prepare to defend against them. | |
Please read the descriptions below: | |
</advisaries> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment