Skip to content

Instantly share code, notes, and snippets.

@numberwhun
Created June 22, 2016 22:14
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save numberwhun/9d6ad0e1879ad9cb4c7cc6c90e4727bd to your computer and use it in GitHub Desktop.
Save numberwhun/9d6ad0e1879ad9cb4c7cc6c90e4727bd to your computer and use it in GitHub Desktop.
Ten_Immutable_Laws_Of_Security
“Ten Immutable Laws Of Security”:
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it’s not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
Law #9: Absolute anonymity isn’t practically achievable, online or offline.
Law #10: Technology is not a panacea.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment