Created
June 22, 2016 22:14
-
-
Save numberwhun/9d6ad0e1879ad9cb4c7cc6c90e4727bd to your computer and use it in GitHub Desktop.
Ten_Immutable_Laws_Of_Security
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
“Ten Immutable Laws Of Security”: | |
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. | |
Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore. | |
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore. | |
Law #4: If you allow a bad guy to run active content in your website, it’s not your website any more. | |
Law #5: Weak passwords trump strong security. | |
Law #6: A computer is only as secure as the administrator is trustworthy. | |
Law #7: Encrypted data is only as secure as its decryption key. | |
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all. | |
Law #9: Absolute anonymity isn’t practically achievable, online or offline. | |
Law #10: Technology is not a panacea. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment