Digital transformation through effective cybersecurity
  • Digital Transformation
  • Corporate Cybersecurity
  • Security / IT Primer
  • Advisory Services
  • Contact

"The unavoidable price of reliability is simplicity"
-Hoare

 

Complex products are more insecure

  • Security is orthogonal to functionality
  • More security bugs in general per line of code
  • Modularity (too much)
  • Interconnectedness
  • Difficulty of understanding
  • Lack of documentation and/or specifications
  • Difficulty of analysis
  • Unfeasibility of patching
  • Difficulty of testing
  • Inhibits incident response (IR)

 

Why security fails

  • Use of proprietary algorithms
  • Use of proprietary protocols
  • Bad randomization
  • Mathematical assumptions
  • Reliance on user remembered secrets
  • Reliance on intelligent users
  • Reliance on global secrets
  • Poor failure modes (NOT "Secure by default")
  • Poor compromise recovery
  • Poor forensics
  • Most importantly: Security is added as an afterthought
    • Adding security later by wrapping security around existing features
    • Adding security changes the way features are implemented
    • Adding security changes to the application interface (may also break code that is reliant on it)

"Security by Design"
is essential


Let us help you change your mindset and address cybersecurity

Cybersecurity
  • General Security Concepts
  • Aspects of Cybersecurity
  • People and Cybersecurity
  • Defender vs. Attacker
  • Complexity vs. Security
  • Resilience vs. Reliability
  • Cyber Hygiene
  • Testing
  • Threats Modeling
  • Traditional vs. IT Domains
  • Traditional vs. IT / Security Engineering
  • What is PCI DSS?
  • Cyber Insurance
  • 5G
  • Aviation
Tweets by intecur
About | Privacy Policy | Cookie Policy | Sitemap
Intecur, Inc. Copyright © 2020 All Rights Reserved.
Log in Log out | Edit
  • Digital Transformation
    • Digital Transformation - Definition
    • The Reality
    • The New Global "M's"
    • Global Trends
    • COVID-19
    • Issues & Challenges
    • Strategy
    • What Stage is Your Organization?
  • Corporate Cybersecurity
    • Cybersecurity Today
    • Corporations
    • Executives
    • Compliance
    • Benefits
    • Strategy
    • Security by Design
  • Security / IT Primer
    • General Security Concepts
    • Aspects of Cybersecurity
    • People and Cybersecurity
    • Defender vs. Attacker
    • Complexity vs. Security
    • Resilience vs. Reliability
    • Cyber Hygiene
    • Testing
    • Threats Modeling
    • Traditional vs. IT Domains
    • Traditional vs. IT / Security Engineering
    • What is PCI DSS?
      • PCI Levels
      • PCI Compliance
    • Cyber Insurance
      • Coverage
      • Qualities
    • 5G
    • Aviation
      • Aviation Systems
      • Aviation Networks
  • Advisory Services
    • CISO-as-a-Service
    • Experience
    • Acronym Glossary
  • Contact
    • About Us
    • Partner Login
  • Scroll to top
Close