nanog mailing list archives

Control. (was Re: MS is vulnerable)


From: "Jamie Reid" <Jamie.Reid () mbs gov on ca>
Date: Thu, 29 Jan 2004 11:32:46 -0500


While acknowledging that I am falling for a troll does not excuse the act
itself, I would like to float an idea I think is useful. 

If you look at security as control, then you can measure it as the ratio of 
controls to features. That is, for N in/egress points there are X active policy 
enforcement gateways. Similarly, for all functions in a peice of software, 
there are X configurable controls of their inputs and outputs and 
en/disabled-state. 

The reason we have "security" vulnerabilities is that we are building (or evolving)
systems that lack adequate controls relative to the sheer volume of their features. 

While access to source-code does not guarantee that the user will exercise their 
control over the software, it does provide more granular control than say, a config 
file, or a clickity-click-configurator. The idea behind commercial software is that it 
is a service in which responsibility for control is maintained by the vendor, with 
a few options available to the user to customize. Open source provides total
control to the user, limited only by their skills or access to information. 

Now, whether this control I am talking about is applicable to "security" as we 
understand it, I will leave that to the reader, but I would speculate that this 
simile could allow for something like cybernetics to be applied to evaluating 
the security of complex systems, and possibly offer more practical solutions 
than the political economy of security that characterizes alot of research in 
the field. 

Best, 

-j








--
Jamie.Reid, CISSP, jamie.reid () mbs gov on ca
Senior Security Specialist, Information Protection Centre 
Corporate Security, MBS  
416 327 2324 
<doug () nanog con com> 01/29/04 09:26am >>>

Microsoft software is inherently less safe than Linux/*BSD software.

This is because Microsoft has favored usability over security.

This is because the market has responded better to that tradeoff.

This is because your mom doesn't want to have to hire a technical
consultant to manage her IT infrastructure when all she wants to do is get
email pictures of her grandkids.

doug

Attachment: TEXT.htm
Description:


Current thread: