Time Based Security

Time Based Security
Author :
Publisher :
Total Pages : 190
Release :
ISBN-10 : 9798583047444
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Time Based Security by : Winn Schwartau

Download or read book Time Based Security written by Winn Schwartau and published by . This book was released on 2020-12-17 with total page 190 pages. Available in PDF, EPUB and Kindle. Book excerpt: Time Based Security in a NutshellThe model for Time Based Security (TBS) originated with conversations with Bob Ayers, formerly of the Defense Information Systems Agency (DISA) over a period of years. As a result of many napkin drawings, especially in Warsaw, Poland, TBS was born. In the two years since we spent hours and days arguing over the principles, I have had the opportunity to develop TBS into a workable mathematical model for quantification of security.I have always maintained that to offer a reasonable defense, one has to know how to attack networks. So, TBS, here we go.Defensive Products Do Not and Cannot Work.The current and prevalent methods to defend networks against attack is an approach 10,000 years old based upon classic military strategy: build your defensive walls as high as you can to keep the bad guys out. This is also known as Fortress Mentality. However, it hasn't worked since the dawn of time and still doesn't work. Consider Troy: Odysseus and the Greeks camped themselves out on the plains of Troy for nine years before they screamed, "We give up! And here's a horse as a present." We all know the results. The Great Wall of China was meant to keep the marauding Mongolians at bay yet advanced technology like the catapult, battering ram and bribery of guards won out. The Maginot Line; the Berlin Wall: none of them worked because they can't.This fundamental error in historical judgement, though, was what modern defensive information security was based on: how can we build the walls around our networks high enough to keep the bad guys out. Oops! Wrong again. They began with the false premise that they could in fact keep the bad guys out and them compounded the error in the erroneous belief that everyone who had access to the networks was already cleared as a good guy; a pro-US gung-ho Marine-like good guy. However, this incorrect model was based upon another antique premise: computers operate in isolation -there is nonsuch thing as a network.When the Trojans let the drawbridge to their city descend to admit the horse, they were networking with the outside world. When the Germans bypassed the Maginot Line, they created a network with the French - right or wrong. When people sailed over or around the Berlin Wall, the network connection was made. Thus, the principle of Fortress Mentality began to collapse as a viable defensive posture. When the security pioneers began to develop security models, they took a similar approach because the network had not yet begun to live and expand as an independent entity. And then the hackers started at us.So, based upon the antiquated model of Fortress Mentality, our network defense program began. And the result? Use firewalls. Use passwords. Use Access Control Tables. But now the question: A lot of people have made a lot of money selling both the government and the private sector tons of firewalls another protective equipment to defend their networks. Sound like a plan, right? Well, maybe it isn't. Name me one company who guarantees their product! Name me one company who will provide a warranty that if you use their products, they will legally accept responsibility for any losses you suffer if their products are compromised. Never mind that some of the most popular defensive products are created by foreign government sponsored organizations which do not release source code on how their products work.


Time Based Security Related Books

Time Based Security
Language: en
Pages: 190
Authors: Winn Schwartau
Categories:
Type: BOOK - Published: 2020-12-17 - Publisher:

DOWNLOAD EBOOK

Time Based Security in a NutshellThe model for Time Based Security (TBS) originated with conversations with Bob Ayers, formerly of the Defense Information Syste
Introduction to Information Security
Language: en
Pages: 383
Authors: Timothy Shimeall
Categories: Computers
Type: BOOK - Published: 2013-11-12 - Publisher: Newnes

DOWNLOAD EBOOK

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationshi
Responsive Security
Language: en
Pages: 262
Authors: Meng-Chow Kang
Categories: Business & Economics
Type: BOOK - Published: 2017-09-08 - Publisher: CRC Press

DOWNLOAD EBOOK

Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for a
PKI Uncovered
Language: en
Pages: 424
Authors: Andre Karamanian
Categories: Computers
Type: BOOK - Published: 2011-02-17 - Publisher: Pearson Education

DOWNLOAD EBOOK

The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI Layered approach is designed t
Official Gazette of the United States Patent and Trademark Office
Language: en
Pages: 1658
Authors: United States. Patent and Trademark Office
Categories: Patents
Type: BOOK - Published: 1992-10 - Publisher:

DOWNLOAD EBOOK