Ten Immutable Laws Of Security (Version 2.0) Microsoft Security Response Center

  • 19 April 2014
  • 7 replies
  • 13 views

Userlevel 7
Badge +56
Here at the Microsoft Security Response Center, we investigate thousands of security reports every year. In some cases, we find that a report describes a bona fide security vulnerability resulting from an issue in one of our products; when this happens, we develop a corrective update as quickly as possible. In other cases, the reported problems simply result from a mistake someone made in using the product, or our investigation finds a problem with the product that, while troublesome for users, does not expose them to a security vulnerability. But many fall in between. They are genuine security problems, but the problems don't result from product flaws. Over the years, we've developed a list of issues like these that we call the 10 Immutable Laws of Security.
Don't hold your breath waiting for an update that will protect you from the issues we'll discuss below. It isn't possible for Microsoft—or any software vendor—to "fix" them, because they result from the way computers work. But don't abandon all hope yet. Sound judgment is the key to protecting yourself against these pitfalls, and if you keep them in mind, you can significantly improve the security of your computers, whether they sit on your desk, travel in your pocket, or exist in a virtual cloud. (Throughout this list we’ll use “computer” to mean all of those objects, by the way.)
 
The 10 Immutable Laws
 
Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
Law #9: Absolute anonymity isn't practically achievable, online or offline.
Law #10: Technology is not a panacea.
 
It's a good read for everyone that uses Internet Devices!
 
Full Article
 
Daniel 😉

7 replies

Userlevel 7
Badge +62
Hello, Thank you TripleHelix for this awesome informative link to article. Great news to read for everyone ...

Salute,
Userlevel 7
Badge +56
Votre Sherry bienvenus!
 
Merci,
 
Daniel 😉
Userlevel 7
Badge +62
Heehee off subject but I think you just wrote in French. 😉
Userlevel 7
Badge +56
Oui.
 
Daniel 😉
Userlevel 7
Great information. Thanks for posting Daniel. I'm truly inspired now.:)
Userlevel 7
Daniel, thank you.
 
An excellent read and quite thought provokiing indeed.
 
Regards
 
 
 
Baldrick
Userlevel 7
Badge +54
Great article Daniel, thank you.

Reply