The principle used in the last blog, "Nothing useful can be said about the security of a mechanism except in the context of a specific application and environment," is also known as Courtney's First Law.
Courtney's Second Law says, "Never spend more mitigating a risk than tolerating it will cost you." The Generally Accepted Information Security Practices refer to this principle as the Principle of Proportionality. The amount to be spent on mitigating a risk should be proportional to the risk. Whatever the effectiveness of a remedy, if its cost exceeds the risk it is time to stop.
At one level the principle is simply a restatement of good economics; a measure must be efficient. In order to be said to be efficient, a security measure must be cheaper than any of the alternatives, including that of doing nothing.
The application of the Principle of Proportionality protects us from irrational fear. It protects us from over-reacting. It protects us from responding to the last successful attack or the threat, or the vulnerability de jour.
One sure way to know that one has violated this principle is when the solution is worse than the problem one set out to solve. Can you say "transportation security."
This may be the most important principle of security. The consistent application of this principle is why we get paid the big bucks.
Saturday, January 23, 2010
Subscribe to:
Post Comments (Atom)
This comment has been removed by a blog administrator.
ReplyDeleteGreat Article
ReplyDeleteCyber Security Projects Ideas for CSE
Project Centers in Chennai
JavaScript Training in Chennai
JavaScript Training in Chennai
Security+ training I really enjoy reading and also appreciate your work.
ReplyDeleteIt was extremely pleasant to peruse an article composed on this blog. I might likewise want to include a couple of systems with the best of my insight which can help the peruser to an ever increasing extent. Cybersecurity services virginia
ReplyDeleteEasily, the article is actually the best topic on this registry related issue. I fit in with your conclusions and will eagerly look forward to your next updates. security company
ReplyDeleteThis comment has been removed by the author.
ReplyDelete